Search Results - (( java implementation path algorithm ) OR ( changes using normalization algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Fire severity and post-fire generation using : Landsat [NDVI], [NBR] and [SAVI] / Nur Izzaty Dali by Dali, Nur Izzaty

    Published 2018
    “…Pre-fire and post-fire of Landsat 7 ETM+ images were obtained to identify the fire severity using Normalized Burn Ratio algorithms. The objectives of this study are (1) to produce Normalized Difference Vegetation Index (NDVI), Normalized Burn Ratio (NBR), and Soil Adjusted Vegetation Index (SAVI) and (2) to determine the changes of forest distribution based on NDVI, NBR and SAVI changes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…The proposed method will use convolutional autoencoders to calculate the reconstruction error and combine the hidden features extracted by the encoder as the input of the random forest to distinguish normal data from abnormal data. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…Then the next step was to test the mitigation algorithm, the same above scenarios of attack were repeated and the entropy change after the mitigation was observed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Capture and estimate the speed of the object for remote monitoring / Nor Sajidah Ab Ghani by Ab Ghani, Nor Sajidah

    Published 2016
    “…The optical flow used Kanade Lucas Algorithm method to track the vehicle movement in the video. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Dynamic algorithms were compared to the change in the flexural rigidity as based on the change in the second moment of inertia of the beam cross-section at the crack zone. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Normally, there is a variance in the sensitivity of different modes and the global stiffness change is derived by taking the algebraic average, which is equivalent to the mean in statistical analysis terms. …”
    Get full text
    Get full text
    Article
  17. 17

    Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach by Phua, Mui How, Tsuyuki, Satoshi

    Published 2004
    “…The accuracy of detection was satisfactory that the algorithm was used in deforestation detection of the whole study area in two change periods i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Dynamic traffic light flow control system using on-road sensor technology / Mohamed Irfan by Mohamed , Irfan

    Published 2017
    “…The controller uses Traffic Light Signal Manipulation Algorithm (TLSMA) to dynamically change in the traffic signals by using the data generated by the sensors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis