Search Results - (( java implementation path algorithm ) OR ( filing adoption using algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- filing adoption »
- using algorithm »
- path algorithm »
- adoption using »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Confidentiality based file attributes and data classification using TsF-KNN
Published 2015“…The main objective of this study is to predict the confidential and non-confidential data of a file using K-NN algorithm. We also proposed a method called Training dataset Filtration Key Nearest Neighbour (TsF-KNN) classifier which classifies the data of file based on the confidentiality level of the schema of a file (file attributes). …”
Get full text
Get full text
Conference or Workshop Item -
6
Determinants of electronic tax filing and employee performance among tax officers in Jordan
Published 2017“…The Partial Least Squares Method (PLS) algorithm and bootstrap techniques were used to test the hypotheses. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…An algorithm was used to verify filetypes by looking up a File Signature library to compare files’ header with their extension. …”
Get full text
Get full text
Thesis -
11
Impatient job scheduling under cloud computing
Published 2012“…The proposed algorithm was transplanted in an adopted scheduling algorithm and tested using simu-lation with a synthetic dataset. …”
Get full text
Get full text
Thesis -
12
Face recognition using Eigenface/PCA / Muhammad Fadzli Ahmad Jalalulmahalli
Published 2005“…As for this thesis, the title is face recognition, which deal with the recognition of faces using computational methods. The algorithm that was adopted for this particular projects is the eigenfance algorithm, which reprocesses a set of face images into eigenvectors, or of ghostly faces, that shall be used as the base for the recognition process. …”
Get full text
Get full text
Thesis -
13
-
14
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
Get full text
Get full text
Thesis -
15
-
16
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The consensus algorithm has also substantially reduced the block creation time. …”
Get full text
Get full text
Thesis -
17
Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation
Published 2023“…The passive congregation theory of natural being's social behaviour is adopted to updated the standard PSO algorithm and used to develop and optimise a reservoir release policy for monthly basis. …”
Article -
18
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…This research identifies a process to measure the ASE values using ADS-B data. Subsequently, a computer algorithm and interfacing tool is developed. …”
Get full text
Get full text
Get full text
Thesis -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
20
Pixel-based skin color detection technique
Published 2005Get full text
Get full text
Get full text
Article
