Search Results - (( java implementation path algorithm ) OR ( using context using algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Providing Ubiquitous Positioning Using Context Aware Handover Algorithm by Khan, Mohammod Sazid Zaman

    Published 2012
    “…This research alms to solve the problem of ubiquitous positioning by designing a context aware handover algorithm for positioning systems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithm for the cliticization of context dependent pronouns in Pashto language by Din, Azizud, Malancon, Bali Ranaivo, Yeo, Alvin W.

    Published 2013
    “…In this paper, an algorithm is presented for the cliticization of context dependent strong pronouns which backtracks to previous adjacent clause(s) to replace context dependent strong pronoun with clitics using syntactic constraints.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    CPU Burst Processes Prioritization Using Priority Dynamic Quantum Time Algorithm: A Comparison with Varying Time Quantum and Round Robin Algorithms by Mohammed, Maysoon A., Mazlina, Abdul Majid, Balsam, A. Mustafa, Ghani, Rana Fareed

    Published 2015
    “…The proposed algorithm gave results better than RR and IRRVQ in terms of minimizing the number of context switches, average waiting time, average turnaround time, design and analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-queue CPU Process Prioritization using a Dynamic Quantum Time Algorithm Compared with Varying Time Quantum and Round-Robin Algorithms by Mohammed, Maysoon A., Mazlina, Abdul Majid, Balsam, A. Mustafa

    Published 2016
    “…In this study, we propose a priority multi queues algorithm with dynamic quantum time. The algorithm uses multi queues with different quantum times for the processes. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim by Ismail Hashim, Mohd Izzat

    Published 2019
    “…Previous studies have shown that context-aware techniques have been widely used in healthcare application. …”
    Get full text
    Get full text
    Thesis
  14. 14

    CPU Thread Prioritization Using a Dynamic Quantum Time Round-Robin Algorithm by Mohammed, Maysoon A., Mazlina, Abdul Majid, Balsam, A. Mustafa, Ghani, Rana Fareed

    Published 2016
    “…In this study, we propose a priority Round-Robin algorithm with dynamic quantum time (PDQT). The algorithm used the old fixed quantum time to generate new one for each process depending on its priority. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Mobile user location prediction: genetic algorithm-based approach by Mantoro, Teddy, Muataz, Zubaidah, Ayu, Media Anugerah

    Published 2010
    “…This paper presents a prediction of user location using genetic algorithm and based location history in finding a number of solutions of possible location when applied to recorded context histories, framework is presented and the result are discussed. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
    text::Thesis
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Context Aware Handover Algorithms For Mobile Positioning Systems by Zaman Khan, Sazid, Thilek, Silvadorai, Tan, Chen Wei, Ramadass, Sureswaran, Anwar, Toni

    Published 2014
    “…This work proposes context aware handover algorithms for mobile positioning systems. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20