Search Results - (( java implementation path algorithm ) OR ( using code ((based algorithm) OR (graph algorithm)) ))
Search alternatives:
- java implementation »
- implementation path »
- graph algorithm »
- path algorithm »
- using code »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Article -
3
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Student Project -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
5
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…The challenge in regression testing is the selection of best test cases from the existing test suite.This paper presents an evolutionary regression test case prioritization for object-oriented software based on extended system dependence graph model of the affected program using genetic algorithm. …”
Get full text
Get full text
Article -
6
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
An effective transmit packet coding with trust-based relay nodes in VANETs
Published 2020“…Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. …”
Get full text
Get full text
Get full text
Article -
10
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The objective of this study is to develop an algorithm based on the aerosol optical thickness (AOT) for mapping PM1 0 using digital camera and satellite imageries. …”
Get full text
Get full text
Thesis -
11
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
12
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES
Published 2008“…A reduced size or errors from previous is used in the algorithm. A graph similar to the theoretical BER vs SNR is obtained for both interleaved and non-interleaved BCH codes. …”
Get full text
Get full text
Final Year Project -
14
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…To address these shortcoming issues many security experts use different approaches to detect malware based on various static features. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…In this project, several models will be presented and analysed, with the normal equation in Linear Regression will be the algorithm used to simulate it. Furthermore, the data will be clustered in this project utilising threshold-based approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
18
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
19
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…Furthermore, the hash-join and Sort-Merge algorithms were used to generate the join query processing, and this was employed due to their capacity to allow for more data sets to be joined. …”
Get full text
Get full text
Thesis -
20
Partitioning techniques and their parallelization for stiff system of ordinary differential equations
Published 2007“…Parallelizing the right algorithm in the partitioning code will give a better perfonnance with shorter execution times. …”
Get full text
Get full text
Thesis
