Search Results - (( java implementation path algorithm ) OR ( policy implementation among algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…Despite the implementation of the mentioned core functionalities of a desktop grid simulator, advanced features such as viewing real-time graphical charts, generating PDF reports of the simulation result and exporting the final result as CSV files has been also included among the other features.…”
    Get full text
    Get full text
    Final Year Project
  6. 6

    The effect of government policy on the relationship between organizational factors and construction waste management in Abuja, Nigeria by Nasidi, Yusuf

    Published 2016
    “…Poor motivation for the implementation of the construction on-site waste reduction, insufficient waste management skills, the shortage of appropriately designed and decently handled landfill system, lack of team work, unequal workload and task distribution among the divisions is the result of poor organizational structure among construction organizations in Nigeria. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…It enhances the grants access authorization for permitted distributed intensive applications’ tasks. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Malaysia residential load profile management based on time of use tariff using ant colony optimization algorithm by Dahlan, Nofri Yenita, Sulaima, Mohamad Fani, Wan Hanapi, Wan Noor Azzyati, Noor Din, Muhamad Muhtazam

    Published 2022
    “…However, such an energy management policy is usually geared towards industrial and commercial consumers’ but rarely towards residential consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…The purpose of this paper is to identify the critical factors affecting contractors’ risk attitudes among Malaysian construction companies with the moderating role of government policy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…Among the two proposed algorithms, that is, ACO and ACO2, ACO2 outperform than ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode. by Tan , Beng Ghee

    Published 2016
    “…The implemented hashes are Murmur2 Hash, City Hash, One-at-a-time Hash, SuperFast Hash, and Lookup3 Hash. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024) by Ibrahim Brian, Muhammad Shyazzwan

    Published 2025
    “…This model serves as a practical guide for educators and stakeholders aiming to implement AI-enhanced pedagogies responsibly. Ultimately, the study underscores the need for interdisciplinary collaboration among educators, policymakers, and technology developers to foster sustainable and inclusive learning environments. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Dynamic approaches for spectrum control in cognitive radio networks by Mohamedou, Ahmed

    Published 2015
    “…Interior-Point Method is used to find the best spectrum sharing and medium access policy to achieve this objective. The second solution assumes the autonomy of secondary users where the decision to update transmiss on power is distributed among users. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…A control mechanism is defined as well to control the non-cooperative behavior and fair-use policy among CMs. Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
    Get full text
    Get full text
    Thesis