Search Results - (( java implementation path algorithm ) OR ( using practical use algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- using practical »
- path algorithm »
- practical use »
- use algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
6
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
7
-
8
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…Online algorithms are used in a variety of situations such as forex trading, cache replacement, and job scheduling etc. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A practical method for the analysis of genetic algorithms
Published 2011“…The experimental result done on some of the known genetic algorithms show the usefulness of the proposed method in improving the quality of genetic algorithms.…”
Get full text
Get full text
Get full text
Article -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
Pre-emptive resource-constrained multimode project scheduling using genetic algorithm: a dynamic forward approach
Published 2016“…Then algorithm is then applied for scheduling a hospital in practice. …”
Get full text
Get full text
Get full text
Article -
12
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…Furthermore, the accuracy of the state estimate with the smallest state error covariance is enhanced by using the Kalman filtering theory. This enhancement produces the filtering solution by using the second sub-algorithm. …”
Get full text
Get full text
Thesis -
13
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
Get full text
Get full text
Thesis -
14
Classgrid: timetabling system using genetic algorithm
Published 2024Get full text
final_year_project -
15
Student-supervisor matching using stable marriage algorithm / Siti Farahana Nodzari
Published 2007“…Therefore, the main objective of this project is to develop a system that is able to match student to the supervisor using Stable Marriage Algorithm. Students who do not know lecturers area and which lecturer is suitable for their project can use this system in order to find lecturer's in the same area using this matching system. …”
Get full text
Get full text
Thesis -
16
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…Consequently, the practical applicability of the NLFXLMS algorithm is limited by this drawback. …”
Get full text
Get full text
Thesis -
17
AntNet: a robust routing algorithm for data networks
Published 2004“…Successful implementation and operation of a network largely depends on the routing algorithm in use. To date, several routing algorithms are in use but the problem with these algorithms is that they are either not adaptive or not robust enough, thus limiting the proper use of bandwidth. …”
Get full text
Get full text
Get full text
Article -
18
Optimization of drilling path using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Article -
19
Modelling and Optimization of Asymmetric Vehicle Routing Problem Using Particle Swarm Optimization Algorithm
Published 2021“…The computational experiment was conducted using five test problems with different sizes. The optimization results indicated that this algorithm able to offer good solutions with the best answer for the practical problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
CSC669 - Cryptographic Algorithms / College of Computing, Informatics and Media
Published 2021“…The subject delivery combines both theoretical and practical aspects of cryptography algorithms…”
Get full text
Get full text
Get full text
Teaching Resource
