Search Results - (( java implementation path algorithm ) OR ( basic implementation level algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Adaptive routing algorithms and implementation for TESH network by Miura, Yasuyuki, Kaneko, Masahiro, Rahman, M.M. Hafizur, Watanabe, Shigeyoshi

    Published 2013
    “…The Tori-connected mESH (TESH) Network is a k-ary n-cube networks of multiple basic modules, in which the basic modules are 2D-mesh networks that are hierarchically interconnected for higher level k-ary n-cube networks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implementation if PID controller for controlling the liquid level of the coupled tank system by Mohd Izzat, Dzolkafle

    Published 2009
    “…MATLAB has been used to simulate and verified the mathematical model of the controller. Visual Basic 6 has been used to implement the graphical user interface (GUI) and implementation issues for the controller's algorithms will also be discussed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Implementation of PID controller for controlling the liquid level of the coupled tank system by Mohd Izzat, Dzolkafle

    Published 2008
    “…MATLAB has been used to simulate and verified the mathematical model of the controller. Visual Basic 6 has been used to implement the graphical user interface (GUI) and implementation issues for the controller’s algorithms will also be discussed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli by Ramli, Muhammad Harith

    Published 2017
    “…Swarm intelligence (SI) algorithm is implemented because there are lot of previous works which prove that the SI is good for segmentation and classification. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. The aim of this study were to conduct a research on how to identify the implementation of security analysis of image using 3D-AES block cipher algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Level control (tank 1) of coupled tank liquid level system using integral control state feedback controller by Ahmad Syauqi, Adnan

    Published 2009
    “…SIMULINK/MATLAB has been used to simulate and verified the mathematical model of the controller. Visual Basic 6 has been used to implement the graphic user interface (GUI) and implementation issues for the controller’s algorithms will also be discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Speech Compression Using Discrete Wavelet Transform by M.Ali Najih, Abdulmawla

    Published 2003
    “…Basically, this scheme consists of four operations which are the transform, threshold techniques (by level and global threshold), quantization, and entropy encoding operations. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran by Kalyani , Bahskaran

    Published 2021
    “…Subsequently, a computer algorithm and interfacing tool is developed. The tool enables any personal with basic computer literacy and access to the tool and data file to process the data and asses the HKP of the flight at ease. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…In order to help with the situation of COVID-19 pandemic, a predictive model on the infected patient’s severity level is constructed. The predictive model is used to forecast the severity level of a person who is infected with COVID-19 virus based on his various symptoms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Modified hierarchical 3D-torus network by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Horiguchi, Susumu

    Published 2005
    “…However, the restricted use of physical links between basic modules in the higher level networks reduces the dynamic communication performance of this network. …”
    Get full text
    Get full text
    Get full text
    Article