Search Results - (( java implementation path algorithm ) OR ( missing devices using algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…The proposed algorithm which is purpose to determine the accurate of the location of the tracked smartphone in order to maximize the probability to find the device associated with time in order to avoid the children from missing. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…This project suggesting a modified DTW algorithm with the proposed Missed Nodes Recovery Algorithm aims to improve the mapping performance, hence the development of stroke to stroke signature comparison is possible. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Pet location tracking mobile application using Kalman Algorithm by Khor, Tsu Ming

    Published 2022
    “…Kalman algorithm has been used to increase the accuracy of obtaining the exact location of the pets. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Application of the phasor measurement unit for protecting unintentional islanding of the distribution system by Arefin, A.A.

    Published 2023
    “…Lagrange interpolation is also used to assess data quality and locate PMU data that are missing. …”
    Get full text
    Get full text
    Book
  12. 12

    Increasing data storage of coloured QR code using CoMMT technique by Abas, Azizi, Yusof, Yuhanis, Din, Roshidi, Azzali, Fazli, Osman, Baharudin

    Published 2020
    “…Quick Response (QR) Code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. There are many existing research on coloured QR Code to increase the storage capacity but from time to time the storage capacity still need to be improved. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Optimal Route Determination System (ORDS) for Pedestrian Safety by Ta, ThuHa

    Published 2009
    “…The system is developed using internet aid wireless technology for ease of access. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…Firstly, an enhanced data transformation model (2CsDQT) is proposed to assess and improve big data quality. A new algorithm using ontology and clustering methods is used to identify and correct incomplete and inconsistent data, which resolves the availability and comprehensiveness of data, similarity between data items, and missing specific attributes of data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced notes capture using super resolution technique on tecogan by Lee, Theresa Wen Yan

    Published 2023
    “…The concept is similar to documents scanning using mobile devices which users are able to capture the messages on the whiteboard, screen and notebook, then images can be further saved as enhanced notes in a softcopy file. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    An automated Printed Circuit Board (PCB) defects detection system by Kamaruddin, Shafie, Shamsulamri, Saiffaqrullah, Sharwazi, Muhammad Haziq Fakhri, Suhaimi, Muhammad Harith Ikhmal, Mohamad, Muhamad Ariff Othmani, Sukindar, Nor Aiman, Ahmad Azhar, Ahmad Zahirani

    Published 2025
    “…Defects such as shorts, spurious copper, and missing holes can significantly compro-mise electronic devices’ reliability and performance. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    The effect of dataset imbalance on the performance of SCADA intrusion detection systems by Balla, Asaad, Habaebi, Mohamed Hadi, Elsheikh, Elfatih A A, Islam, Md Rafiqul, Suliman, F M

    Published 2023
    “…Countless studies used deep learning algorithms to design an efficient IDS; however, the fundamental issue of imbalanced datasets was not fully addressed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article