Search Results - (( java implementation path algorithm ) OR ( using a calling algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- calling algorithm »
- path algorithm »
- a calling »
- using a »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
6
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
7
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Secondly, the proposed call admission control algorithm improved the resource utilization algorithm thus reducing the call block, call dropped, call degradation. …”
Get full text
Get full text
Thesis -
8
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Get full text
Thesis -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
10
The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman.
Published 2007“…The conventional decoding method is hard decision based whereby the message of the demodulator is quantized only to two levels. The demodulator makes a firm decision whether a bit is a 0 or a 1, which are called hard bits. …”
Get full text
Get full text
Research Reports -
11
Cryptanalysis in cryptographic algorithm design
Published 2006“…Cryptography is a science of protecting information by changing it into unreadable format (encryption) called ciphertext using a key. …”
Get full text
Conference or Workshop Item -
12
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
13
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…This thesis presents a new approach to optimize the performance of a dual beam optical scanning system in terms of its scanning combinations and speed, using Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
14
Fast zerox algorithm for routing in optical multistage interconnection networks.
Published 2010“…Based on the ZeroX algorithm, a fast and efficient crosstalk-free time- domain algorithm called the Fast ZeroX or shortly FastZ_X algorithm is proposed for solving optical crosstalk problem in optical Omega multistage interconnection networks. …”
Get full text
Get full text
Article -
15
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Then, the Fast Zero (FastZ) algorithm is proposed, which uses a new concept called the symmetric Conflict Matrix (sCM) as a pre-scheduling technique. …”
Get full text
Get full text
Thesis -
16
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
17
Real Coded Genetic Algorithm (RCGA): a new RCGA mutator called Scale Truncated Pareto Mutation
Published 2014“…STPM is used with Laplace Crossover (LX) taken from literature to form a new generational RCGA called LX-STPM. …”
Get full text
Get full text
Article -
18
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
19
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…In this paper, we attempt to use Gaussian mixed model, which is a probabilistic model normally used in speech recognition to identify fraud calls in the telecommunication industry. …”
Get full text
Get full text
Get full text
Article -
20
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…By manually validating the dataset, it is found that the algorithm achieves accuracy of up to 86.67. © 2020 IEEE.…”
Get full text
Get full text
Conference or Workshop Item
