Search Results - (( java implementation path algorithm ) OR ( using anis using algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- using algorithm »
- path algorithm »
- using anis »
- anis using »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Implementation of CORDIC Algorithm in vectoring mode / Anis Shahida Mokhtar and Abdullah Mohd Fadzullah
Published 2015Get full text
Get full text
Conference or Workshop Item -
6
Particle swarm optimization (PSO) for CNC route problem
Published 2002“…We often see many of the method of Genetic Algorithm (GA), Ant Colony Optimization (ACO), Simulated Annealing Algorithm (SAA) and PSO are used for any optimization problems. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
8
Comparison between alpha beta pruning algorithm and greedy algorithm in designing winning strategies in the game of checkers / Christy Jr Tan
Published 2007“…The algorithm is useful in some of the game search available today. …”
Get full text
Get full text
Student Project -
9
Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani
Published 2021Get full text
Get full text
Student Project -
10
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021“…Therefore, this project develops a smart object detection using deep learning algorithm and jetson nano to improve object detection for blind people. …”
Get full text
Get full text
Conference or Workshop Item -
11
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Enhannced sampling algorithm in bluetooth low energy for indoor localization
Published 2018“…For outdoor, Global Positioning System (GPS) is being used by peoples to navigate to any places in the world and also used in rocket or guided missile system as well. …”
Get full text
Get full text
Thesis -
14
-
15
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
16
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…The comparison of the result of the developed integrated algorithm using two benchmark FMS scheduling algorithms datasets is conducted. …”
Get full text
Get full text
Thesis -
17
-
18
A survey of state of the art: hierarchical routing algorithms for wireless sensor networks
Published 2014“…One of those solutions is using efficient routing algorithm. The most efficient type of algorithms that can be used for WSNs in large areas is hierarchical routing algorithms. …”
Get full text
Get full text
Get full text
Article -
19
Segmentation of flair magnetic resonance brain images using K-Means Clustering algorithm / Nur Nabilah Abu Mangshor
Published 2010“…This research can be improved in future by hybrid K-Means Clustering algorithm with any existing segmentation techniques.…”
Get full text
Get full text
Thesis -
20
Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis
Published 2017“…The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
Get full text
Get full text
Get full text
Get full text
Article
