Search Results - (( java implementation path algorithm ) OR ( implementation _ function algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A-star (A*) algorithm implementation for robotics path planning navigation by Emirul Ridzwan, Nor Azmi

    Published 2018
    “…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8
  9. 9

    Comparative implementation of the benchmark Dejong 5 function using flower pollination algorithm and the African buffalo optimization by Odili, Julius Beneoluchi, Noraziah, Ahmad

    Published 2019
    “…This communication presents experimental research findings on the application of the flower pollination algorithm (FPA) and the African buffalo optimization (ABO) to implement the complex and fairly popular benchmark Dejong 5 function. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…This project used iterative method to investigate the security algorithm and implemented the algorithm. Besides that, iterative methods also used to improve the frequency, power and are requirements performance of RIPEMD-160 hash function. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE by SUN, LEE KUANG

    Published 2006
    “…Finally the adaptive algorithm is added to the filter, and implemented in the FPGA. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL by Sharifah Azizah, Wan Alwi

    Published 2022
    “…RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Implementation of safe experimentation spiral dynamics algorithm for self-tuning of PID controller in elastic joint manipulator by Mohd Ashraf, Ahmad, Mohd Zaidi, Mohd Tumari, Mohd Riduwan, Ghazali, Mohd Helmi, Suid

    Published 2022
    “…Such modification is implemented to exploit the ability of spiral function in enhancing both the algorithm's exploration competency and convergence accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…For this purpose, cryptography hash functions are selected as a design target. These algorithms have been studied to improve the speed, area implementation, and power consumption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Training functional link neural network with ant lion optimizer by Mohmad Hassim, Yana Mazwin, Ghazali, Rozaida

    Published 2020
    “…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed by Mohamed, Mohamad Zuhairy

    Published 2008
    “…As a new result it is in fact shown that the algorithm iteratively solves a Model Predictive Control related cost function. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…Optimal Layout is the layout of the arrangment of CMOS transistor with the implementation of a random logic functional on an array of CMOS transistor. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
    Get full text
    Get full text
    Thesis