Search Results - (( java implementation path algorithm ) OR ( pattern detection force algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…This thesis proposes a real time gait phase detection system to control AAFO for rehabilitation and assist ankle motion. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A new split based searching for exact pattern matching for natural texts by Hakak, Saqib Iqbal, Kamsin, Amirrudin, Shivakumara, Palaiahnakote, Idris, Mohd Yamani Idna, Gilkar, Gulshan Amin

    Published 2018
    “…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
    Get full text
    Get full text
    Article
  8. 8

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Mohd Faizal, Ab Razak

    Published 2023
    “…The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias by Normazlianita, Mohamad Alias

    Published 2021
    “…This feature makes it suitable to detect the pattern of head movement and hence a call bell for patients with special needs.…”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Spectral Estimation And Supervised Classification Technique For Real Time Electromyography Pattern Recognition by Burhan, Nuradebah

    Published 2018
    “…Electromyography (EMG) signal is a biomedical signal which measures physical activity of human muscle.It has been acknowledged to be widely used in rehabilitation or recovery application system assisting physiotherapist to monitor a patient’s physical strength,function,motion and overall well-being by addressing the underlying physical issues.In application system associated with rehabilitation,a signal processing and classification techniques are implemented to classify EMG signal obtained.For real time application in the rehabilitation, the classification is crucial issue.The success of the signal classification depends on the selection of the features that represent a raw EMG signal in the signal processing.Therefore,a robust and resilient denoising method and spectral estimation technique have been acknowledged as necessary to distinguish and detect the EMG pattern.The present study was undertaken to determine the characteristic of EMG features using denoising method and spectral estimation technique for assessing the EMG pattern based on a supervised classification algorithm.In the study,the combination of time-frequency domain (TFD) and time domain (TD) were identified as the preferred denoising method and spectral estimation techniques.In the first part of study, the recorded EMG signal filtered the contaminated noise by using wavelet transform (WT) approach which implemented discrete wavelet transform (DWT) method of the wavelet-denoising signal. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhanced faster region-based convolutional neural network for oil palm tree detection by Liu, Xinni

    Published 2021
    “…Hence, this research aims to close the research gaps by exploring the deep learning-based object detection algorithm and the classical convolutional neural network (CNN) to build an automatic deep learning-based oil palm tree detection and counting framework. …”
    Get full text
    Get full text
    Thesis