Search Results - (( java implementation path algorithm ) OR ( knowledge creating types algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. …”
    Get full text
    Conference or Workshop Item
  6. 6

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…There arc 3 types of encryption algorithm provided which are 3-DES , RC 4 and RC2. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Two types of testing were conducted to evaluate the effectiveness of proposed algorithms, which is the performance and accuracy test. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An automated strabismus classification using machine learning algorithm for binocular vision management system by Muhammad Amirul Isyraf, Rohismadi, Anis Farihan, Mat Raffei, Nor Saradatul Akmar, Zulkifli, Mohd. Hafidz, Ithnin, Shah Farez, Othman

    Published 2023
    “…Binocular vision is a type of vision that allows an individual to perceive depth and distance using both eyes to create a single image of their environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Automatic lexicon generator by Varathan, Kasturi Dewi, Tengku Sembok, Tengku Mohd, Abdul Kadir, Rabiah

    Published 2010
    “…In this paper we present an algorithm to create an automatic lexicon generator in order to generate lexicon from an input document by making use of Apple Pie Parser. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Intelligent mining of large-scale bio-data: bioinformatics applications by Hashemi, Farahnaz Sadat Golestan, Ismail, Mohd Razi, Yusop, Mohd Rafii, Hashemi, Mahboobe Sadat Golestan, Shahraki, Mohammad Hossein Nadimi, Rastegari, Hamid, Miah, Gous, Aslani, Farzad

    Published 2017
    “…Bioinformatics creates heuristic approaches and complex algorithms using artificial intelligence and information technology in order to solve biological problems. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Image based authentication using zero-knowledge protocol by Mohamad, Z., Thong, L.Y., Zakaria, A.H., Awang, W.S.W.

    Published 2018
    “…In this paper, a new algorithm that using zero-knowledge protocol as the solution to solving the eavesdropping and shoulder surfing attack to provide better system security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…Neuro-fuzzy inference engine and/or system is knowledge based data processing system and can manage the human reasoning course and create decisions based on uncertainty and imprecise situations. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…Therefore, the difficulty of creating different scenarios of attacks in a real environment has been decreased. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Vision based entomology: a survey by Hassan, Siti Noorul Asiah, Abdul Rahman, Nur Nadiah Syakira, Htike@Muhammad Yusof, Zaw Zaw, Shoon , Lei Win

    Published 2014
    “…This paper details advances in insect recognition, discussing representative works from different types of method and classifiers algorithm. Among the method used in the previous research includes color histogram, edge detection and feature extraction (SIFT vector). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Advances in automatic insect classification by Hassan, Siti Noorul Asiah, Abdul Rahman, Nur Nadiah Syakira, Htike@Muhammad Yusof, Zaw Zaw, Shoon , Lei Win

    Published 2014
    “…This paper details advances in insect recognition, discussing representative works from different types of method and classifiers algorithm. Among the method used in the previous research includes color histogram, edge detection and feature extraction (SIFT vector). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article