Search Results - (( java implementation path algorithm ) OR ( using factor utilizing algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- using factor »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Predicting factor of online purchasing behaviour among university students in UiTMCT / Mohd Fadzlee Mazlan
Published 2022“…Several prediction rules already been produced with high interestingness by using K-Mean clustering algorithm and Random Tree algorithm. …”
Get full text
Get full text
Student Project -
6
Workload utilization dissemination on grid resources for simulation environment
Published 2013“…A combination of these factors will help in developing an optimized scheduling or load balancing algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
7
Three-term backpropagation algorithm for classification problem
Published 2006“…This algorithm utilizes two term parameters which are Learning Rate, α and Momentum Factor,β. …”
Get full text
Get full text
Thesis -
8
Optimal loading analysis with penalty factors for generators using brute force method
Published 2022“…This paper reports the optimal loading analysis method using the Brute Force method with and without considering the penalty factor of power line loss. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Modification of the ant colony optimization algorithm for solving multi-agent task allocation problem in agricultural application
Published 2024“…The performance of the basic ACO algorithm for solving task allocation is improved by modifying the efficiency factor. …”
Get full text
Get full text
Get full text
Article -
10
Parallel metaheuristic algorithm for route planning using CUDA
Published 2025“…This research will be focusing on developing a Parallel Metaheuristic Algorithm for Route Planning using CUDA to improve the efficiency and performance of route planning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
12
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
Get full text
Get full text
Get full text
Article -
13
Temporal integration based factorization to improve prediction accuracy of collaborative filtering
Published 2016“…The existing temporal-based factorization approaches used the long-term preferences and the short-term preferences. …”
Get full text
Get full text
Get full text
Thesis -
14
Dynamic modelling of proton exchange membrane fuel cell system for electric bicycle / Azadeh Kheirandish
Published 2016“…Recent models provide high accuracies using complex systems and complicated calculations using advanced optimization algorithms. …”
Get full text
Get full text
Thesis -
15
-
16
Design of intelligent Qira’at identification algorithm
Published 2017“…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
Get full text
Get full text
Thesis -
17
Stereo Matching Algorithm Based On Per Pixel Difference Adjustment, Iterative Guided Filter And Graph Segmentation
Published 2017“…Therefore, this paper proposes an improved algorithm to overcome these limitations. First, the proposed algorithm utilizes per-pixel difference adjustment for AD and gradient matching to reduce the radiometric distortions. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Predicting Customer Behaviour on Buying Life Insurance using Machine Learning
Published 2026journal::journal article -
19
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
20
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article
