Search Results - (( java implementation path algorithm ) OR ( program program anti algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman by Mat Norman, Mohd Arif

    Published 2024
    “…Finite Element (FE) programming is an alternative, but it requires strong theoretical and mathematical knowledge, along with programming skills. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…Researchers from the Satellite Navigation Research Group (SNAG) of UTM are currently conducting a research program that mitigates the effect of the Anti-Spoofing (AS) policy. …”
    Get full text
    Get full text
    Article
  7. 7

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…Many antimalware software packages and tools have been developed to protect legitimate users from these threats. However, legacy anti-malware methods are confronted with millions of potential malicious programs. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Monitoring and Control of Pressure in a Gas Plant via PID plus Feedforward Controller by Sulaiman, Ezyan Hanis

    Published 2009
    “…To execute the overall simulation, the controller is built on MATLAB/Simulink/LabVIEW which is a technical computing program that has easily adaptable structure where control strategies and model variables can be modified. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Prediction of novel doping agent using an in silico model that integrates chemical, biological and phenotypic data by Jamil, Nurul Amalina

    Published 2016
    “…Mitragynine which is listed in WADA Monitoring Program, has also the potential as novel doping agent due to its binding activity on x-opioid receptors. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16