Search Results - (( java implementation path algorithm ) OR ( program transition based algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Urban Transit Scheduling Problem (UTSP) considers the process of creating timely transit schedules that includes bus and drivers assignment based on the users' and operators’ requirements. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Sub-route reversal repair mechanism and differential evolution for urban transit network design problem by Tarajo, Buba Ahmed

    Published 2017
    “…From the literature of UTNDP, the most widely used metaheuristic is the genetic algorithm, at the expense of other population-based metaheuristics. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…The problem occurs during the transition from learning fundamental programming language concept to OOP concept. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Fault detection with optimum March Test Algorithm by Zakaria, Nor Azura, Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Wen, Xiaoqing

    Published 2012
    “…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Switching Time Optimization via Time Optimal Control for Natural Gas Vehicle Refueling by Mahidzal Dahari, Mahidzal

    Published 2007
    “…These become the performance measurements used to evaluate the performance of TOC and other NGV controller currently applied in the commercial NGV dispenser i. e., Kraus refueling algorithm. The performance of the refueling algorithms are evaluated based on three experiments: the first experiment is the performance of valves switching and refueling time transitions; the second experiment is the performance of refueling when the storage pressures are set to 3600 psig while the receiver tank is varied from 20 to 2000 psig; and the third experiment is the performance of refueling when the storage pressures are set to different pressures while the receiver tank is maintained at 20 psig. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Class attendance management system using face recognition by Abdul Rhman Salim, Omar, Olanrewaju, Rashidah Funke, Balogun, Wasiu Adebayo

    Published 2018
    “…By facing the camera, the camera will capture the image then pass it to the Raspberry Pi which is programmed to handle the face recognition by implementing the Local Binary Patterns algorithm LBPs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper