Search Results - (( java implementation path algorithm ) OR ( using computational process algorithm ))
Search alternatives:
- computational process »
- java implementation »
- implementation path »
- process algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
6
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The Quantum Processing Unit (QPU) is the processor of quantum computer that is able to do quantum computations. …”
Get full text
Get full text
Thesis -
7
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
Get full text
Get full text
Thesis -
8
-
9
Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim
Published 2012“…This project focuses on step-up cluster computing and a parallel Genetic Algorithm. The objectives of this project to set-up Beowulf cluster computer to apply the Travelling Salesman Problem in parallel by using Genetic Algorithms and evaluate sequential algorithms and parallel algorithms by Genetic Algorithms. …”
Get full text
Get full text
Thesis -
10
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The improved Hierarchical Load Balancing Algorithm (iHLBA) was chosen as the benchmark algorithm as it focuses on scheduling for hierarchical grid computing environment. …”
Get full text
Get full text
Get full text
Thesis -
11
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
12
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
13
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024Get full text
Get full text
Get full text
Article -
14
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. …”
Get full text
Get full text
Thesis -
16
Analysis of evolutionary computing performance via mapreduce parallel processing architecture / Ahmad Firdaus Ahmad Fadzil
Published 2014“…Evolutionary computation (EC) is a method that is ubiquitously used to solve complex computation. …”
Get full text
Get full text
Thesis -
17
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
18
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…In an effort to reduce the computational time, a new and faster algorithm is required. …”
Get full text
Get full text
Research Report -
19
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Monograph -
20
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…This function has been used in the LUC Cryptosystems. The encryption process of this system is the computations of V(e), while the decryption process is done by the computations of V(d). …”
Get full text
Get full text
Conference or Workshop Item
