Search Results - (( java implementation path algorithm ) OR ( process implementation drops algorithm ))*
Search alternatives:
- process implementation »
- implementation drops »
- java implementation »
- implementation path »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…This eventually brought the study to the implementation of the Inverse Single Drop Multistage (ISDMS)-2D Fuzzy Algorithm on the Mass Transfer of Multiple Drops in Multistage System. …”
Get full text
Get full text
Thesis -
6
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Article -
7
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Thesis -
8
Implementation of Biological Sprouting Algorithm for NoC Fault Tolerance
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). Myers-Briggs Type Indicator is also used as a psychological assessment mechanism in the selection process to enhance the accuracy of the proposed technique. …”
Get full text
Get full text
Thesis -
10
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
11
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In the benchmarking of the SKF and ssSKF algorithms’ performance in solving the 14-hole PCB drill path optimization case study with recent implementations, on average, both algorithms show the ability to converge to the optimal solution at a smaller number of function evaluations compared to the Gravitational Search Algorithm (GSA), Cuckoo Search (CS), and Intelligent Water Drop (IWD), although fall-short to the Taguchi- Genetic Algorithm optimization algorithm.…”
Get full text
Get full text
Thesis -
12
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
13
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
14
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…The result of the evaluation showed that CHID gains a significant performance improvement in terms of resource consumption and packet drop rate, compared to the default packet-based detection implementation. …”
Get full text
Get full text
Get full text
Thesis -
15
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
16
Development of Blockchain-Based Secure Wide Area Measurement System for Smart Grid Integration
Published 2021“…In conventional IoT-based BC architectures, each sensor reading is often processed as an individual transaction resulting network congestion and processing overhead that negatively affect real-time data processing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
An Improve k-NN Classifier using Similarity Distance Plot-Data Reduction and Dask for Big Datasets
Published 2025“…The k-Nearest Neighbour (k-NN) algorithm is one of the most widely used Instance-Based Learning methods due to its simplicity and ease of implementation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Modified hybrid median filter for removal of low density random-valued impulse noise in images / Dr. Siti Noraini Sulaiman ... [et al.]
Published 2017“…However, the performance drops at high noise densities, resulting the appearance of patches and unpreserved image. …”
Get full text
Get full text
Research Reports -
19
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…Presently, VANET technology is surrounded with security challenges and it is essentially important for VANET to successfully implement a security measure according to the safety applications requirements. …”
Get full text
Get full text
Thesis -
20
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Wireless Power Transfer (WPT) is a process of transferring electrical energy without using any physical wire or cable. …”
Get full text
Get full text
Thesis
