Search Results - (( java implementation path algorithm ) OR ( using practical consideration algorithm ))
Search alternatives:
- practical consideration »
- consideration algorithm »
- java implementation »
- implementation path »
- using practical »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Optimal Location And Sizing Of Distrubuted Generator Using PSO And GA Algorithms In Power Systems
Published 2019“…This research aimed to reduce total power losses and improve voltage profiles of the distribution system by proposing a practical swarm optimizion algorithm GA genetic algorithm to optimize DG size and location by taking into consideration increase number of DG units in the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Practical considerations on Quantum Key Distribution (QKD)
Published 2013Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography
Published 2020“…The conclusions in this paper can be used for practical industrial processes, regarding the adaptive selection of relaxation factor and the number of iterations needed.…”
Get full text
Get full text
Article -
8
Real time electrocardiogram identification with multi-modal machine learning algorithms
Published 2017“…There is a considerable number of research in the past with high accuracy for identification, however, most ignore the practical time required to identify an individual. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
10
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis -
11
Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms
Published 2014“…As a solution to the above mentioned issues, four new distance methods have been proposed in this thesis, which are based on the rows of a feature matrix of 2DPCA-based algorithms. Through experiments, using eight face databases, their improvements compared to the previous distance methods are demonstrated.…”
Get full text
Get full text
Thesis -
12
Prediction of photovoltaic system output using hybrid Cuckoo Search Least Square Support Vector Machine / Muhammad Aidil Adha Aziz
Published 2019“…This thesis presents a practical and reliable approach for the prediction of PV power output using an intelligent-based technique namely Cuckoo Search Algorithm - Least Square Support Vector Machine (CS-LSSVM). …”
Get full text
Get full text
Thesis -
13
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…In the scripting language evaluation, nine LLHs and three single PSO algorithms have been successfully created using the scripting languages. …”
Get full text
Get full text
Thesis -
14
System Monitoring Tools Version 2.0 (SMTv2) green computing (power management) / Nurul Amira Binti Tahir
Published 2013“…In this paper, we propose part of green algorithm which calculates the power consumption use by the CPU. …”
Get full text
Get full text
Thesis -
15
-
16
Hybrid BLEU Algorithm For Structured Exam Management System
Published 2008“…This system incorporate algorithm BLEU into the expert system to check the answer and evaluate marks for every assessment. …”
Get full text
Get full text
Get full text
Thesis -
17
Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim
Published 2023“…No free lunch theorem implies that no particular algorithm or combination of features will always produce considerably superior outcomes to others. …”
Get full text
Get full text
Thesis -
18
Microprocessor implementation of three phase PWM switching strategies
Published 1999“…All the necessary microprocessor hardware/software techniques and algorithms required to implement and generate three-phase Pulse Width Modulation (PWM) are developed in detail, and demonstrated using practical results from an experimental microprocessor board. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
20
Exploring university students' utilization of AI tools in academic assignments: benefits, challenges, and ethical considerations
Published 2025“…This study explores university students' utilization of AI tools in academic assignments, focusing on their benefits, challenges, and ethical considerations. Using a quantitative approach, data were collected through a survey conducted at the International Islamic University Malaysia (IIUM). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
