Search Results - (( java implementation path algorithm ) OR ( knowledge driven implementation algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Clustering for binary data sets by using genetic algorithm-incremental K-means by Saharan, S., Baragona, R., Nor, M. E., Salleh, R. M., Asrah, N. M.

    Published 2018
    “…This research was initially driven by the lack of clustering algorithms that specifically focus in binary data. …”
    Get full text
    Get full text
    Article
  6. 6

    A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive by ARROFIQ, MUHAMMAD

    Published 2010
    “…The widely used conventional control that is based on mathematical model of the controlled system is very complex and not easy to be determined since it requires explicit knowledge of the motor and load dynamics. This thesis proposed a design and implementation of a PLC-based hybrid controller from a basic PLC to a PWM-driven variable-voltage variable-frequency (VVVF) speed control of an induction motor and the analysis, evaluation and improvement of the control strategies. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Predicting YSPSAH's product preferences across department of private hospitals by Abd Malik, Nur Aisyah Syahirah

    Published 2025
    “…Future enhancements could involve integrating real-time data and testing advanced forecasting algorithms to improve model performance. Overall, this project demonstrates the potential of predictive modelling and MBA to transform historical sales data into strategic knowledge, optimising procurement planning and enhancing operational efficiency in the pharmaceutical industry.…”
    Get full text
    Get full text
    Student Project
  9. 9

    Accept or reject? Predicting ideation outcomes through enterprise social media by Rozaidi, Nik Ahmad, Gibbs, Jennifer L., Eisenberg, Julia

    Published 2017
    “…Implementing social media in the workplace may make it easier for employees to participate in knowledge sharing activities such as Q&A and ideation.However, vetting the quality of answers and ideas becomes more complex when anyone in the company can contribute. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Fuzzy expert system modeling of laser processing by Subramonian, Sivarao, Ahmad, Kamely, Md Palil, Md Dan

    Published 2009
    “…The objective of the paper is: to design knowledge based rules, algorithm, architecture & learning ability to develop fuzzy surface roughness predictive model for laser machining; to develop fuzzy predictive model using design parameters which were critically analyzed; to make a comparative study of the observed and modelled surface roughness output of 5mm Mn-Mo pressure vessel plate. …”
    Get full text
    Get full text
    Article
  12. 12

    Intelligent material handling mobile robot for industrial purpose with active force control capability by Mailah, Musa, Jamaluddin, Hishamuddin, Pitowarno, Endra, Purnomo, Didik Setyo

    Published 2005
    “…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
    Get full text
    Get full text
    Monograph
  13. 13

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…The thesis presents the design, necessary data structures, algorithms and implementation details of JLOG. The results of comparing the performance of JLOG to regular PROLOG and Tabled PROLOG systems are also presented.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…They play the most important roles in implementing construction projects, and their activities have a significant impact on their risk attitudes during the execution of projects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article