Search Results - (( java implementation path algorithm ) OR ( knowledge perceptions based algorithm ))
Search alternatives:
- knowledge perceptions »
- java implementation »
- implementation path »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
6
A preliminary framework of measuring music attractiveness based on facial beauty theory
Published 2016“…Since the advent of modern computing, various methods were introduced to help music composition, such as Markov Chain (MC), Genetic Algorithm, Knowledge-Based system, and Cellular Automata. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Does organizational culture matter in the relationship between trust and SMEs performance
Published 2018“…Research limitations/implications – The study used perceptions of owner/managers and only small-scale industries. …”
Get full text
Get full text
Get full text
Article -
10
Artificial intelligence in the construction industry / Nurul Najihah Mad Rosni
Published 2023“…Artificial intelligence (AI) is a subfield of computer science that enables machine to perceive and develop human-like inputs for perception, knowledge representation, reasoning, planning and problem solving, so they may cope with complex and fuzzy issues in a deliberate, intelligent and adaptive way. …”
Get full text
Get full text
Article -
11
Motion planning and control for autonomous vehicle collision avoidance systems using potential field-based parameter scheduling
Published 2024“…A particle swarm optimization algorithm is used to optimize the knowledge database information that is developed based on the perception of driver toward risk in the driving environment. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
Motion planning and control for autonomous vehicle collision avoidance systems using potential field-based parameter scheduling
Published 2024“…A particle swarm optimization algorithm is used to optimize the knowledge database information that is developed based on the perception of driver toward risk in the driving environment. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
13
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
Get full text
Get full text
Get full text
Thesis
