Search Results - (( java implementation path algorithm ) OR ( knowledge using protocol algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- protocol algorithm »
- knowledge using »
- path algorithm »
- using protocol »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…Second, involving more remote nodes becoming seed nodes for further discoveries. Four different algorithms have been investigated; (i) Farthest/Farthest Algorithm, (ii) Farthest/Nearest Algorithm, (iii) Nearest/Farthest Algorithm and (iv) Nearest/Nearest Algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
7
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
8
Image based authentication using zero-knowledge protocol
Published 2018“…In this paper, a new algorithm that using zero-knowledge protocol as the solution to solving the eavesdropping and shoulder surfing attack to provide better system security. …”
Get full text
Get full text
Conference or Workshop Item -
9
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…The proposed routing algorithm is simulated using MATLAB for performance evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…Recently, VANET routing protocols have been improved using the multilevel knowledge and an up-to-date global view of traffic conditions offered by SDN technology. …”
Get full text
Get full text
Get full text
Article -
11
Performance Evaluation for Network Set up and Nodes Discovery Protocol in Underwater Grid Topology Networks
Published 2010“…In this paper the structured grid topology networks is used to compare and evaluate the performances of the algorithms. …”
Get full text
Get full text
Get full text
Article -
12
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Recently, VANET routing protocols have been improved using the multilevel knowledge and an up-to-date global view of traffic conditions offered by SDN technology. …”
Article -
13
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. …”
Get full text
Get full text
Thesis -
14
Automated feature extraction for predicting multiple sclerosis patient disability using brain MRI
Published 2022“…Expanded Disability Status Scale (EDSS) is a common protocol used to manually score the disability level. …”
Get full text
Get full text
Article -
15
Rogue access point detection and tracking system using trilateration algorithm
Published 2023Get full text
Get full text
Book Section -
16
-
17
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
18
Improving the security model of software define networks
Published 2023“…An by securing the connection between the main controller and northbound administration with the use of certain algorithm hashing protocol, it would further increase the security of the command line in the whole network. …”
text::Final Year Project -
19
Implementing universal priority DBA algorithm in PIC based EPON testbed
Published 2023“…To the best of our knowledge, this is the first time PIC is being used in EPON testbed for this purpose. …”
Article -
20
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2015“…All phantom images were acquired using standard field of view (FOV) of 230mm with various acquisition and reconstruction protocols depending on the parameters studied. …”
Get full text
Get full text
Book Section
