Search Results - (( java implementation path algorithm ) OR ( programming technology exploitation algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Analysis the components of SNOW 3G and ZUC ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2018
    “…The SNOW 3G and ZUC ciphers algorithms are classified as stream ciphers, used as confidentiality algorithms in third and fourth generations of Mobile Technologies (3G-UMTS and 4G- LTE). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad by Mohammad, Norhasmira

    Published 2022
    “…In addition, the software development based on the suggested method is currently in Technology Readiness Level 4, which means the technology has been validated in the lab. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
    Get full text
    Get full text
    Thesis