Search Results - (( java implementation path algorithm ) OR ( using string _ algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- using string »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
6
String matching algorithms: to search and compare longest common subsequence strings retrieved from Wagner & Fischer and Hirschberg algorithms on Malay dictionary words / Mohd Razi...
Published 1999“…Dynamic programming is used to solve both the String Distance Problem and Longest Common Subsequence (LCS) problem. …”
Get full text
Get full text
Thesis -
7
GPU-based odd and even hybrid string matching algorithm
Published 2016“…Experimental results indicate that the performance of the hybrid string matching algorithms has been improved, and the speedup, which has been obtained, is considerable enough to suggest the GPU as the suitable platform for these hybrid string-matching algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…While the dynamic string transformation increase the difficulty level of predicting the substitution table used. …”
Get full text
Get full text
Article -
9
Optimisation of corona ring design and its impact on the performance of insulator string in high voltage transmission lines / Kalaiselvi Aramugam
Published 2022“…However, installing a corona ring with an optimum design to reduce the electric field magnitude on an insulator string is a challenging task. Therefore, in this work, a method to achieve an optimum design of a corona ring for a 33 kV and 132 kV composite non-ceramic insulator string was proposed using optimisation methods; Gravitational Search Algorithm (GSA), Imperialist Competitive Algorithm (ICA) and Grey Wolf Optimisation (GWO). …”
Get full text
Get full text
Thesis -
10
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An Algorithm for Automatically Updating a Forsyth-Edwards Notation String without an Array Board Representation
Published 2023Conference Paper -
12
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
Published 2007Get full text
Get full text
Conference or Workshop Item -
14
-
15
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
16
Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system: article / Wan Nur Liyana Wan Abd Rahman
Published 2013“…This paper presented the configuration of a photovoltaic (PV) array of a grid-connected photovoltaic (GCPV) system by using Cuckoo Search (CS) algorithm. The best PV module and inverter that can produce the optimal number of PV modules per strings and the optimal number of parallel PV strings was determined by using CS in order to make the GCPV system produce higher expected annual energy output with the given roof space.…”
Get full text
Get full text
Article -
17
Cuckoo search algorithm for sizing optimization in grid-connected photovoltaic system / Wan Nur Liyana Wan Abd Rahman
Published 2013“…This paper presented the configuration of a photovoltaic (PV) array of a grid-connected photovoltaic (GCPV) system by using Cuckoo Search (CS) algorithm. The best PV module and inverter that can produce the optimal number of PV modules per strings and the optimal number of parallel PV strings was determined by using CS in order to make the GCPV system produce higher expected annual energy output with the given roof space.…”
Get full text
Get full text
Thesis -
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
19
KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming
Published 2023“…However, sometimes, the matching does not only use variable data types. In some cases, the available variables are string data types. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Particle swarm optimization for NARX structure selection application on DC motor model: article / Mohd I. Abdullah
“…By representing its particles technique as probabilities of change (bit flip) of a binary string, the binary string was then used to select a set of repressors as the model structure, and the parameter estimated using QR decomposition.…”
Get full text
Get full text
Article
