Search Results - (( java implementation path algorithm ) OR ( its implementation growth algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Furthermore the algorithm is still keeping its simplicity of non-multiplicative and nonexponentiation public-key cryptosystem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Recent advances of whale optimization algorithm, its versions and applications by Alyasseri Z.A.A., Ali N.S., Al-Betar M.A., Makhadmeh S.N., Jamil N., Awadallah M.A., Braik M., Mirjalili S.

    Published 2024
    “…The WOA was proposed by Mirjalili in 2016 and its success implement in different real-world problems. …”
    Book chapter
  9. 9

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…The ABC algorithm is implemented to improve the recommendation accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Reduced Galloping Column Algorithm For Memory Testing by Ngieng , Siew Ching

    Published 2015
    “…However, the existing GalCol algorithm takes huge test time due to its test complexity. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The behaviours of convergents in θ-expansions: computational insights based on θ-expansions algorithm using the maple software by Muhammad, K. N., Kamarulhaili, H., Asbullah, M. A., Sapar, S. H.

    Published 2024
    “…Consequently, it proved to be an efficient method for fast computer implementation. The growth rate of θ-convergent was investigated to highlight the performance of θ-convergent. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of hierarchical analytical scheduling (HAS) - a conceptual framework. by Harun, Harlisya, Mohd. Sharif, M. F., Mariun, N., Chulan, Ungku, Khazani, Khamizon

    Published 2012
    “…HAS is based on the concept of hierarchical temporal memory (HTM), in which the scheduling is derived on the priority and similarity of data from the aspect of space and time. Implemented with OCTAVE, a simulation of the model is implemented to analyse its behaviour in a hypothetical cache management scenario.…”
    Get full text
    Conference or Workshop Item
  17. 17

    The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Siddiqui, Sumrana, Sarkar, Rashel

    Published 2024
    “…A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
    Get full text
    Get full text
    Thesis
  19. 19

    The development of instrument for real-time monitoring of heavy metal discharge for batik industry by Zukri, Mohammad Nizar Mohamed

    Published 2019
    “…In order to ensure the results are robust, other significant parameters such as temperature and acidity (represented in pH) were considered during mathematical formulation development. The control algorithm using PID loop was implemented in the system devices to generate the sufficient voltage input energizing the conductivity sensor. …”
    Get full text
    Get full text
    Thesis
  20. 20