Search Results - (( java implementation path algorithm ) OR ( using string means algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…They are: 1) Reproduction means the creation of new generations, 2) Crossover means interchanging of parts of parent strings into the child string, and 3) Mutation means the random bit flip. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Embedded car plate image recognition system by Moo Wui Hung

    Published 2008
    “…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
    Get full text
    Learning Object
  10. 10

    The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction by Marlan Z.M., Ramlie F., Jamaludin K.R., Harudin N.

    Published 2023
    “…Specifically, a Great Value Priority binarization scheme is employed to transform the continuous location of the bat into a binary bit, representing a combination of the variable in binary string form. A comparative study was conducted, and the mean absolute error metric was used as the performance measure. …”
    Article
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Meta search engine powered by DBpedia by Chin, Kim On, Patricia Anthony, Boo, Vooi Keong, Rosalam Sarbatly

    Published 2012
    “…This semantic meta search engine also uses Google to generate the search results of a given query, explores the meaning of the query using DBPedia andfinally displays the results in cluster similar to the technique used by Yippy. …”
    Get full text
    Get full text
    Research Report
  13. 13

    Design and modelling of an autonomous robotic airship with soft computing control by Wong, Wei Kitt

    Published 2012
    “…The GPS and telemetry data were processed using string recognition methods.The processed and filtered telemetry and GPS data were fed to the fuzzy logic system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…When compared with industry standard methods, the neural networks show very poor performance when 2-D bit-strings descriptors are used. However, their relative performance improves when used with topological indices as descriptors. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…The sentence selected for embedding watermarking bit are 85% higher in speed due to faster embedding watermarking bit string.The relation of information-hiding capacity is 1:5.5 which means that for every 5.5 terms of text, one bit of watermark can be hidden data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Advancing Predictive Maintenance: Median-Based Particle Filtering in MOSFET Prognostics by Hadi E.F., Baharuddin M.Z.B., Zuhdi A.W.M.

    Published 2025
    “…To address this issue, we introduced a high-performance prognostic model that promises to take advantage of both the Adaptive Particle Filter (APF) and Gaussian Process Regression (GPR), which is called as PF-GPR method. The model used a genetic algorithm to control when and how many particles were adaptively resampled applying different weighted strategies (mean or median) in response of the stochastic system deterioration. …”
    Article