Search Results - (( java implementation path algorithm ) OR ( knowledge level optimization algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- level optimization »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
-
6
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
7
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…Trends and perspectives in dynamic environments point towards a need for optimal operating levels in reconfigurable manufacturing activities. …”
Get full text
Get full text
Thesis -
8
Enhancement of lightweight block cipher algorithms
Published 2017“…Third, there is lack knowledge on key dependent S-box within lightweight algorithms. …”
Get full text
Get full text
Book -
9
A Review on energy consumption optimization techniques in IoT based smart building environments
Published 2019“…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms, and the introduction of new optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
11
Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper
Published 2022“…In this paper, MR fluid damper with Fuzzy-PID controller is examined to be optimized using a modified DE algorithm. However, in the Fuzzy-PID controller, the fuzzy logic algorithm is used to auto-tune the PID controller, but it cannot be considered as a fully real-time controller since the fuzzy algorithm uses a previous knowledge base built offline. …”
Get full text
Get full text
Article -
12
-
13
A review on energy consumption optimization techniques in IoT based smart building environment
Published 2019“…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms and the introduction of new optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Smart waste management system with IoT monitoring
Published 2023Get full text
Get full text
Get full text
Article -
16
Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman
Published 2017“…This study made an attempt to incorporate knowledge transfer-related variables (articulability of knowledge, credibility of knowledge source, gap of theory-practice, embedded knowledge and environmental uncertainty) into the framework. …”
Get full text
Get full text
Book Section -
17
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Experimental results show that our proposed privacy algorithm is able to work effectively in terms of privacy level (12.01 against 10.48), efficiency (2.74ms against 3.84ms) and scalability (470.15ms against 507.48ms), when dealing with multivariate traffic attributes. …”
Get full text
Get full text
Thesis -
18
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The results obtained are then analysed to assess the proposed solution’s performance in obtaining each deployment objective’s optimal value. Finally, the proposed algorithm’s effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
19
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The results obtained are then analysed to assess the proposed solution's performance in obtaining each deployment objective's optimal value. Finally, the proposed algorithm's effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
20
Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar
Published 2016“…Determining the suitable algorithm which can bring the optimized group clusters could be an issue. …”
Get full text
Get full text
Thesis
