Search Results - (( java implementation path algorithm ) OR ( using _ calling algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- calling algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
6
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
Get full text
Get full text
Conference or Workshop Item -
7
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
8
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Secondly, the proposed call admission control algorithm improved the resource utilization algorithm thus reducing the call block, call dropped, call degradation. …”
Get full text
Get full text
Thesis -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Get full text
Thesis -
10
The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman.
Published 2007“…The decoding based on soft bits are referred to as soft decision decoding. The algorithm uses soft decision information to rank the reliability of the received symbols. …”
Get full text
Get full text
Research Reports -
11
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…Therefore, this work presents an email to readable Vietnamese text conversion algorithm for use in TTS application. The average processing time tested on 60 emails is 1.7 milliseconds (ms). …”
Get full text
Get full text
Conference or Workshop Item -
12
Cryptanalysis in cryptographic algorithm design
Published 2006“…Therefore, a cryptographic algorithm has to endure cryptanalysis to ensure that it is safe for private or public use. …”
Get full text
Conference or Workshop Item -
13
Fast zerox algorithm for routing in optical multistage interconnection networks.
Published 2010“…It is shown that using the new iCM, the original ZeroX algorithm is simplified, thus improved the algorithm by reducing the time to complete routing process. …”
Get full text
Get full text
Article -
14
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Subjects:Conference Paper -
15
Enhancement of RSA Key Generation Using Identity
Published 2015“…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
Get full text
Get full text
Get full text
Book Chapter -
16
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…The problem of using range function in Heterogeneous Euclidean-Overlap Metric (HEOM) is addressed by replacing the range with interquartile range function called Interquartile Range-Heterogeneous Metric (IQR-HEOM). …”
Get full text
Get full text
Get full text
Thesis -
17
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
18
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Then, the Fast Zero (FastZ) algorithm is proposed, which uses a new concept called the symmetric Conflict Matrix (sCM) as a pre-scheduling technique. …”
Get full text
Get full text
Thesis -
19
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024Subjects:Proceedings Paper -
20
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…In this paper, we attempt to use Gaussian mixed model, which is a probabilistic model normally used in speech recognition to identify fraud calls in the telecommunication industry. …”
Get full text
Get full text
Get full text
Article
