Search Results - (( java implementation path algorithm ) OR ( system implementation level algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Implementation if PID controller for controlling the liquid level of the coupled tank system by Mohd Izzat, Dzolkafle

    Published 2009
    “…This project presents the PID controller design for controlling liquid level of coupled tank system. These coupled tank liquid level systems are in second order system. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Implementation of PID controller for controlling the liquid level of the coupled tank system by Mohd Izzat, Dzolkafle

    Published 2008
    “…This project presents the PID controller design for controlling liquid level of coupled tank system. These coupled tank liquid level systems are in second order system. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    A modified H-bridge multilevel inverter for photovoltaic system by Abd Rahim, N., Chaniago, K., Selvaraja, J.

    Published 2010
    “…The proposed system was implemented in a prototype.…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…The proposed algorithm was implemented on hardware using Verilog-HDL, and targeting Field Programmable Gate Array (FPGA) applications. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Agents for Fuzzy Indices of Reliability Power System with Uncertainty Using Monte Carlo Algorithm by Shalash, Nadheer A., Abu Zaharin, Ahmad

    Published 2014
    “…The standard deviation of load level uncertainty in power system reliability assessment has a different value for each load level leading to complexity iterations required in the convergence of Monte Carlo algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise