Search Results - (( java implementation path algorithm ) OR ( using analytical protocol algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…This is achieved by using a new design algorithm by separating marker TCP and UDP protocols and extended the marking probability for injecting more green and yellow traffic into the network. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks by Alzyoud, Faisal Yousef Abed-alrahman

    Published 2011
    “…The analytical results for link throughput and average delay were used to validate the simulated results.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks by Al-Zyoud, Faisal Yousef Abed-alrahman

    Published 2011
    “…The analytical results for link throughput and average delay were used to validate the simulated results.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Real-time and predictive analytics of air quality with IoT system: A review by Nurmadiha, Osman, Mohd Faizal, Jamlos, Fatimah, Dzaharudin, Aidil Redza, Khan, You, Kok Yeow, Khairil Anuar, Khairi

    Published 2020
    “…(iv) Data analytics for Air Pollution Index (API) prediction along with IoT, with various communication protocols can as-sist in the development of real-time, and continuous high precision environmen-tal monitoring systems. v) Machine Learning (ML) Regression algorithm is suit-able for prediction and classification of concentration gas pollutant, while ANN and SVM algorithm is used for forecasting.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    An efficient network mobility management for a 6LoWPAN mobile network in hospital environments by Shahamabadi, Mohammadreza Sahebi

    Published 2017
    “…Finally, by using the selective optimal algorithm, the MR energy consumption in NEMO-HWSN is minimized by approximately 15.5%. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan by Md Disa, Nor Anees Asyiqin, Khairul Anwar, Khairunnisa Munawarah, Mazlan, Aniesa Farhana

    Published 2022
    “…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Lightweight authentication technique for secure communication of edge/fog data-centers by Yahuza, Muktar, Idris, Mohd Yamani Idna, Wahab, Ainuddin Wahid Abdul, Garba, Adamu Abdullahi, Musa, Mahadi A.

    Published 2020
    “…The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. …”
    Get full text
    Get full text
    Article
  17. 17

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The rapid vertical handover for efficient IPv6 mobility support in heterogeneous wireless network by Abdullah, Radhwan Mohammed, Abdullah, Azizol, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Subramaniam, Shamala

    Published 2014
    “…In this article, we propose an enhanced network layer mechanism that is used to support fast handover for VHO. We introduce a new idea for the access router discovery method and propose a rapid VHO algorithm accordingly. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Chaotic dynamics in a non-linear tumor-immune model with Caputo�Fabrizio fractional operator by Ali A., Althobaiti S., Althobaiti A., Khan K., Jan R.

    Published 2024
    “…The Laplace transform along with the Adomian decomposition approach is used to construct an algorithm for a semi-analytical solution under the CF fractional derivative. …”
    Article