Search Results - (( java implementation path algorithm ) OR ( knowledge sharing process algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Machine learning cases in clinical and biomedical domains by Che Azemin, Mohd Zulfaezal, Ashimi, Tijani Ahmad, Md Mustafa, Md Muziman Syah

    Published 2018
    “…The evidence found from the verses suggests that ANN shares similar learning process to achieve belief (iman) by analysing the similitudes (amsal) introduced to the algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Another downside is test results being subject to change with experts knowledge and years of experience. These factors lead to low accuracy and it becomes a lengthy process due to large number of images. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…Diffie–Hellman key exchange method allows two people that have no previous knowledge of each other to jointly create a shared secret key over an insecure channel. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Accept or reject? Predicting ideation outcomes through enterprise social media by Rozaidi, Nik Ahmad, Gibbs, Jennifer L., Eisenberg, Julia

    Published 2017
    “…Implementing social media in the workplace may make it easier for employees to participate in knowledge sharing activities such as Q&A and ideation.However, vetting the quality of answers and ideas becomes more complex when anyone in the company can contribute. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A hybrid cryptosystem for biometric authentication and template protection by Jegede, Abayomi Joshua

    Published 2017
    “…The proposed key binding scheme known as modified shielding function minimizes the complexity of image processing and addresses the security as well as privacy limitations of generic shielding function. …”
    Get full text
    Get full text
    Thesis