Search Results - (( java implementation path algorithm ) OR ( using all using algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm achieved 100%, hence, all E-mails considered can be used as public keys.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…However, the Tripathi algorithm cannot use all of the users’ email addresses as a public key. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran

    Published 2018
    “…Many researchers dealing with smartphone sensors to recognize human activities using machine learning algorithms. In this paper, we proposed One-versus-All (OVA) strategy with relief-f and self-adaptive algorithm to recognize these activities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions by Ting Kien Hua, Noraini Abdullah

    Published 2020
    “…All Possible Path Algorithm (APPA) was another algorithm that was also used to rank all the alternatives path based on multiple criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…Maximum power point tracking (MPPT) is a necessary function in all photovoltaic (PV) systems. The classic incremental conductance (IC) MPPT algorithm is widely used in the literature. …”
    Get full text
    Article
  11. 11

    Multiregion segmentation of mammogram images by using parametric kernel graph cut algorithm / Nurhanani Abdul Rahim, Nor Farah Nabilah Mushtafa and Nadhirah Afiqah Zailan by Abdul Rahim, Nurhanani, Mushtaf, Nor Farah Nabilah, Zailan, Nadhirah Afiqah

    Published 2019
    “…Therefore, Parametric Kernel Graph Cut Algorithm was used in this study. Parametric Kernel Graph Cut Algorithm is an improvisation of the original Graph Cut. …”
    Get full text
    Get full text
    Student Project
  12. 12

    The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad by Ahmad, Azriana

    Published 1999
    “…The performance of this Malay stemming algorithm is tested using translated Quran documents and Malay dictionary. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…Results of the experiments that were conducted using various data sets showed that the proposed algorithm produced better course schedule solution than the Greedy Algorithm, Genetic Algorithm, and other variants of Ant System Algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…This research is all about predicting future sales using Genetic Algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Solving Examination Timetabling Problem using Partial Exam Assignment with Great Deluge Algorithm by Ashis Kumar, Mandal, M. N. M., Kahar

    Published 2015
    “…In this approach, exams are ordered based on graph heuristics and only selected exams (partial exams) are scheduled first and then improved using great deluge algorithm. The entire process continues until all of the exams have been scheduled. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    An efficient method for determining all the extreme points of function with one variable by Pandiya, Ridwan

    Published 2014
    “…The algorithm is directly suitable for a class of problems of commonly used in solving the global optimization problems. …”
    Get full text
    Thesis
  17. 17

    Multi-objective optimization of all-wheel drive electric formula vehicle for performance and energy efficiency using evolutionary algorithms by Tey, Jing Yuen, Ramli, Rahizar

    Published 2020
    “…A new method based on constraint multi-objective optimization using evolutionary algorithms is proposed to optimize the powertrain design of a battery electric formula vehicle with an all-wheel independent motor drive. …”
    Get full text
    Get full text
    Article
  18. 18

    Solving the travelling salesman problem by using artificial bee colony algorithm / Noor Ainul Hayati Mohd Naziri by Mohd Naziri, Noor Ainul Hayati

    Published 2021
    “…ABC algorithm has three types of bees that are used by bees, onlooker bees, and scout bees. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…An improved particle swarm algorithm (HPSOGA) is used to solve complex problems of water resources optimization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…The purpose of this study is to see the accuracy of the algorithms and compare it. The highest algorithm will be chosen as the best model and algorithm that can be used to detect cyberbullying tweet text.…”
    Get full text
    Get full text
    Undergraduates Project Papers