Search Results - (( java implementation path algorithm ) OR ( using ((co using) OR (code using)) algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Increasing data storage of coloured QR code using CoMMT technique by Abas, Azizi, Yusof, Yuhanis, Din, Roshidi, Azzali, Fazli, Osman, Baharudin

    Published 2020
    “…This paper proposes the use of compress, multiplexing and multilayered techniques, as an integrated technique known as CoMM, to increase the storage of the existing QR Code. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Computational study of cobalt oxide: Nanoparticles, surfaces and thin films supported on metal oxide surfaces / Ala’ Omar Hasan Zayed by Ala’ Omar , Hasan Zayed

    Published 2018
    “…In this study, investigation of the structural, energetic, electronic, and magnetic properties of several forms of cobalt oxides as clusters, films and surfaces had been carried out. Besides using our genetic algorithm code called Universal Genetic Algorithm (UGA) combined with DFT calculations to find the global and local energy minimum structures of (CoO)n (n = 3 − 7) clusters, we have also extended the search space to (CoO)nq (n = 3−10, q = 0, +1) clusters by another code of ours, the Modified Basin-Hopping Monte Carlo Algorithm (MBHMC) program, accompanied by accurate DFT calculations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The design of viterbi decoder for low power consumption space time trellis code without adder architecture using RTL model by Abu, Mohd Azlan, Harun, Harlisya, Harmin, Mohammad Yazdi, Abdul Wahab, Noor Izzri, Abdul Kadir, Muhd Khairulzaman

    Published 2016
    “…Design/methodology/approach – The code uses a generator matrix designed for four-state space time trellis code (STTC) that uses quadrature phase shift keying (QPSK) modulation scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…We have investigated two performance characteristics, system sum rate and computational complexity using various linear pre-coding schemes, including the proposed one. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity by Azizi, Abas

    Published 2018
    “…The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20