Search Results - (( java implementation path algorithm ) OR ( knowledge integration security algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement of lightweight block cipher algorithms by Taha Alshaikhli, Imad Fakhri, Al-Dabbagh, Sufyan Salim Mahmood, Zaba, Muhammad Reza

    Published 2017
    “…Second, there are many researches still trying to find an algorithm that has the highest level of security. Third, there is lack knowledge on key dependent S-box within lightweight algorithms. …”
    Get full text
    Get full text
    Book
  6. 6
  7. 7

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Once an insecure condition occurs, new actions must be considered to restore the system to secure operation. The objective of this work is to introduce new algorithms that can enhance power system security inclusive of the remedial action (generation re-dispatch/load shedding) for any scale of power system operation as well as improving the existing ANN to solve the problem faced by power system security assessment. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Optimal variational mode decomposition and integrated extreme learning machine for network traffic prediction by Jinmei Shi, Yu-Beng Leau, Kun Li, Huandong Chen

    Published 2021
    “…However, most of the existing evolutionary algorithms have some adjustable parameters which depend on subjective experience or prior knowledge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…Implemented using Django and SQLite, the system reduced manual efforts and specialized knowledge needed for tool selection, allowing pentesters to focus on complex security tasks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An embedding traid-bit method to improve the performance of Arabic text steganography by Thabit, Reema Ahmed Abdalla

    Published 2016
    “…The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. …”
    Get full text
    Get full text
    Get full text
    Thesis