Search Results - (( java implementation path algorithm ) OR ( pre evaluation protocol algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…There is a large variation of neuroimaging approaches that are utilized for pre-surgical evaluation depending on the protocol of each epilepsy surgery center. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Thus, leading to the improvement of the throughput while adhering to the delay pre-requisites. The performance evaluation of the proposed algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…In addition, most of VANETs clustering approaches use simple evaluation methodology where most of the approaches disregard a significant issue in the evaluation methodology. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
    Get full text
    Get full text
    Thesis