Search Results - (( java implementation path algorithm ) OR ( program detect generating algorithm ))
Search alternatives:
- generating algorithm »
- java implementation »
- implementation path »
- detect generating »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
An optimal mesh algorithm for remote protein homology detection
Published 2011“…This paper also shows that the use of the refinement algorithm increases the performance of the multiple alignments programs by at least 4%.…”
Get full text
Get full text
Article -
6
-
7
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
8
-
9
An optimized test case generation technique for enhancing state-sensitivity partitioning
Published 2017“…Afterwards, a prioritization algorithm used for sorting the test cases so the first test case detects the highest number of mutants followed by the cases that kill its live mutants. …”
Get full text
Get full text
Get full text
Thesis -
10
Fault detection with optimum March Test Algorithm
Published 2012“…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
Get full text
Conference or Workshop Item -
11
-
12
Hybrid genetic algorithm for improving fault localization
Published 2018“…The result of the experiment shows that our technique able to detect multiple faults in various java programs but there is a need for improvement especially in prioritize fault that occurs simultaneously.…”
Get full text
Get full text
Get full text
Article -
13
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…This paper presents a unified approach to process fault detection and diagnosis (FDD) intelligent program for pre-cut fatty acid fractionation column. …”
Get full text
Get full text
Article -
14
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Compared to manual mobile robots, AGRs require sensors and control systems that generate feedback for the re-evaluation of an unexpected situation and to detect obstacles in the path the AGR is required to follow. …”
Get full text
Get full text
Final Year Project -
15
Detection of arcing fault in underground distribution cable using artificial neural network
Published 2004“…The damage can be reduced if arcing faults are detected before they develop into major faults. The general aim of this study is to develop an arcing fault detection algorithm which can detect the presence of arcing fault in underground distribution cable. …”
Get full text
Get full text
Get full text
Thesis -
16
Detection of Microcalcification Using Mammograms
Published 2004“…The mammogram is first digitized and processed by the program developed to detect the microcalcification deposited in the breast. …”
Get full text
Get full text
Final Year Project -
17
Cyclic redundancy encoder for error detection in communication channels
Published 2004“…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. The technique gained its popularity because it combines three advantages: Extreme error detection capabilities, little overhead and ease of implementation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
NEUCOMP2 - parallel neural network compiler
Published 1996“…The parallel routine detects the program loops of the sequential version generated by NEUCOMP, undergoing analysis of the data dependences and transforms it into a parallel version. …”
Get full text
Get full text
Get full text
Article -
19
-
20
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article
