Search Results - (( java implementation path algorithm ) OR ( using programmes service algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- service algorithm »
- using programmes »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
6
Implementation Of Elevator Control System Using Raspberry PI
Published 2018“…Instead of using programmable logic controller, a Raspberry Pi was chosen to act as the master controller to perform the logic algorithm that control the movement of the elevator. …”
Get full text
Get full text
Monograph -
7
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The proposed AES Crypto-Processor accelerates the AES algorithm in reconfigurable Field Programmable Gate Arrays (FPGA). …”
Get full text
Get full text
Thesis -
8
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
9
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…Emergency door car entry system can be implemented using Field Programmable Gate Array (FPGA) board. …”
Get full text
Learning Object -
10
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…Researchers worldwide are still developing experimental works for improvement on the network reliability, quality-of-services and security. Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
Article -
11
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
12
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. …”
Get full text
Get full text
Get full text
Article -
14
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…Consequently, the software-defined networking (SDN) paradigm offers unique features such as programmability and flexibility to enhance vehicular network performance and management and meet the quality of services (QoS) requirements of various VANET services. …”
Get full text
Get full text
Get full text
Article -
15
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
Get full text
Get full text
Thesis -
16
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Consequently, the software-defined networking (SDN) paradigm offers unique features such as programmability and flexibility to enhance vehicular network performance and management and meet the quality of services (QoS) requirements of various VANET services. …”
Article -
17
Maximizing Mobile Communication Efficiency with Smart Antenna Systems using Beam forming and DOA Algorithms
Published 2024Conference Paper -
18
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…The selection would be made based on the hybrid machine learning (ML) algorithm. A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis -
19
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
20
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…However, due to this flexible SDN architecture, it makes it vulnerable to different attacks such as Denial of Service (DoS)/Distributed Denial of Service (DDoS), Man in the Middle (MITM), spoofing and intrusion etc. …”
Get full text
Get full text
Get full text
Get full text
Thesis
