Search Results - (( java implementation path algorithm ) OR ( basic mobile detection algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- mobile detection »
- path algorithm »
- basic mobile »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
6
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
7
Autonomous Fire Fighting Mobile Platform
Published 2012“…This paper describes the development of an Autonomous Fire Fighting Mobile Platform (AFFMP) that is equipped with the basic fighting equipment that can patrol through the hazardous site via a guiding track with the aim of early detection for fire. …”
Get full text
Get full text
Conference or Workshop Item -
8
Mobile Robot with Navigation Control and Communication
Published 2016“…Mobile Robot with Navigation Control and Communication is basically about a mobile robot where a list of instructions is needed to control the locomotion of the robot. …”
Get full text
Get full text
Final Year Project -
9
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…The four basic behaviours of mobile robot are chasing, approaching, avoiding and escaping. …”
Get full text
Get full text
Thesis -
10
Mobile robot positioning system
Published 2008“…This component is build with complete circuit interface to a Parallax Basic Stamp (BS2) microcontroller module. Several motion control algorithm using BS2 software was develop to test the capabilities of system mobile motion in Y axis, X axis and other, particular attention is paid to evaluate the ability of the using Odometry to detect and correct positioning of the mobile platforms from 4 point. …”
Get full text
Learning Object -
11
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
12
Wifi positioning system / Amalina Abdul Halim
Published 2006“…In recent years, wireless technology with its sub standard 802.11 gaining popularityin deploying for positioning system. With development of mobile computing devices and wireless technique, location detection system is used to determine users location either in indoor or outdoor environment that relies on WiFi signal strength. …”
Get full text
Student Project -
13
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
14
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In recent years, several Android malware applications were developed to perform certain illegitimate activities and harmful actions on mobile devices. In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…An embedded controller function as total guard actions that made by robot, it will receive, processing, and define data (input), and decide what that should do by robot to further action. I use the Basic Stamp2 as our controller. For this operation, if sensor detect obstacle, robot will move direction no restriction to reach to last post.…”
Get full text
Learning Object -
16
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
17
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…In the first phase, individual biometrics recognition algorithms were developed for each biometrics feature. …”
Get full text
Get full text
Get full text
Monograph -
18
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Imagine that a notice with a logo of Mobile Phone company is received by an email informing that the customer had recently run up a large mobile phone bill. …”
Get full text
Get full text
Thesis
