Search Results - (( java implementation path algorithm ) OR ( basic data virtualization algorithm ))
Search alternatives:
- virtualization algorithm »
- java implementation »
- implementation path »
- data virtualization »
- path algorithm »
- basic data »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…The Feedback is to produce response from the user regarding the motion data and the position of gestures. Gesture Recognition is to recognise the gestures and performs the basic transformation of the virtual heart. …”
Get full text
Get full text
Academic Exercise -
6
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
7
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithm's efficacy was validated through its application to a basic material handling process, specifically a barcode sorting conveyor. …”
Get full text
Get full text
Get full text
Article -
10
An ensemble feature selection method to detect web spam
Published 2018“…Web spam detection is one of research fields of data mining. With regard to increasing available information in virtual space and the need of users to search, the role of search engines and used algorithms are important in terms of ranking. …”
Get full text
Get full text
Get full text
Article -
11
A calibration framework for swarming ASVs' system design
Published 2012“…This paper is concerned with the virtual simulation of Autonomous Surface Vessels (ASVs) named, Drosobots, using virtual simulation software i. e. …”
Get full text
Get full text
Get full text
Article -
12
On uniform traffic pattern of symmetric midimew connected mesh network
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
13
Heuristic resource allocation algorithm for controller placement in multi-control 5G based on SDN/NFV architecture
Published 2021“…However, the management of resource allocations across multiple data centers is an important issue that still affects 5G core networks. …”
Get full text
Get full text
Get full text
Article -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The objective of this project is to design and build an IoT based sensor system that can send its data wirelessly to a computer, which can then analyse the data and estimate the position of the human arm at remote location. …”
Get full text
Get full text
Get full text
Thesis -
16
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…However, the database structure can still contain large amounts of unstructured textual data. Dealing with unstructured textual data leads to three basic issues; users encounter difficulties to find useful information, inaccurate information retrieval and insufficient performance of query processing. …”
Get full text
Get full text
Thesis -
17
Hand gesture recognition system using image processing
Published 2007“…This system also used algorithm of several processing technique that may or may not be the same output for each type of it. …”
Get full text
Get full text
Thesis -
18
Hand gesture recognition system using image processing
Published 2007“…This system also used algorithm of several processing technique that may or may not be the same output for each type of it. …”
Get full text
Get full text
Undergraduates Project Papers
