Search Results - (( java implementation path algorithm ) OR ( safety implementation using algorithm ))
Search alternatives:
- safety implementation »
- implementation using »
- java implementation »
- implementation path »
- using algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Car plate recognition system : (segmentation)
Published 2005“…In the research,One Pass Thinning algorithm and Partial Segmentation algorithm are the algorithms being applied.For each phase,the used technique produces quite a good result whereby it is to be discussed in detail in the thesis.…”
Get full text
Get full text
Undergraduates Project Papers -
6
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…The RASH algorithm is defined by overall risk, which is equivalent to the sum of Risk Safety Safety, Risk Safety Health, Risk Health Safety, and Risk Health Health. …”
Get full text
Get full text
Thesis -
7
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…In Malaysia, this requirement is outlined in Standard Operation Procedure (SOP) manuals, which specify the mandatory use of seven types of PPE: hard hat, safety goggle, hi-vis vest, safety shoes, gloves, respirator, and earplugs. …”
Get full text
Get full text
Thesis -
8
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…The improved algorithm is used to obtain the rough obstacle avoidance of the vehicle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Lithium-Ion Battery Charge Equalization Algorithm for Electric Vehicle Applications
Published 2023Article -
10
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Implementation Of Algorithm For Vehicle Anti-Collision Alert System In FPGA
Published 2017“…This paper presents the development and implementation of an algorithm to be utilized for vehicle anti-collision alert system, which may be useful to reduce the occurrence of accidents. …”
Get full text
Get full text
Get full text
Article -
12
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
13
Real-time safety helmet detection using enhanced YOLOv5 object detection
Published 2023“…Extensive research was conducted to analyze all feasible algorithms that can be implemented in the safety helmet detection system and compare the proposed model with an existing one to ensure the proposed system can give high accuracy and high inference speed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman
Published 2010“…Our approaches ensure that algorithm and real-time control operations give safety requirements for the system. …”
Get full text
Get full text
Thesis -
16
Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and...
Published 2007“…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. Multiple Signal Classification (MUSIC). …”
Get full text
Get full text
Thesis -
17
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
18
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Property premises intruders detection using face recognition method / Joveni Henry
Published 2017“…Therefore, this project emphasize strongly on developing a system that can detect intruders of property premises by using the face recognition method. This project will focus mainly on the Viola-Jones algorithm for face and facial parts detection, facial geometry distance measure for feature extraction and Similarity Measure algorithm using the Euclidian Distance to perform face recognition. …”
Get full text
Get full text
Thesis
