Search Results - (( java implementation path algorithm ) OR ( using string means algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- means algorithm »
- path algorithm »
- using string »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…They are: 1) Reproduction means the creation of new generations, 2) Crossover means interchanging of parts of parent strings into the child string, and 3) Mutation means the random bit flip. …”
Get full text
Get full text
Thesis -
5
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
7
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
8
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
9
Embedded car plate image recognition system
Published 2008“…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
Get full text
Learning Object -
10
The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction
Published 2023“…Specifically, a Great Value Priority binarization scheme is employed to transform the continuous location of the bat into a binary bit, representing a combination of the variable in binary string form. A comparative study was conducted, and the mean absolute error metric was used as the performance measure. …”
Article -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
12
Meta search engine powered by DBpedia
Published 2012“…This semantic meta search engine also uses Google to generate the search results of a given query, explores the meaning of the query using DBPedia andfinally displays the results in cluster similar to the technique used by Yippy. …”
Get full text
Get full text
Research Report -
13
Design and modelling of an autonomous robotic airship with soft computing control
Published 2012“…The GPS and telemetry data were processed using string recognition methods.The processed and filtered telemetry and GPS data were fed to the fuzzy logic system. …”
Get full text
Get full text
Get full text
Thesis -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
16
-
17
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…When compared with industry standard methods, the neural networks show very poor performance when 2-D bit-strings descriptors are used. However, their relative performance improves when used with topological indices as descriptors. …”
Get full text
Get full text
Monograph -
18
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…The sentence selected for embedding watermarking bit are 85% higher in speed due to faster embedding watermarking bit string.The relation of information-hiding capacity is 1:5.5 which means that for every 5.5 terms of text, one bit of watermark can be hidden data. …”
Get full text
Get full text
Get full text
Thesis -
19
Advancing Predictive Maintenance: Median-Based Particle Filtering in MOSFET Prognostics
Published 2025“…To address this issue, we introduced a high-performance prognostic model that promises to take advantage of both the Adaptive Particle Filter (APF) and Gaussian Process Regression (GPR), which is called as PF-GPR method. The model used a genetic algorithm to control when and how many particles were adaptively resampled applying different weighted strategies (mean or median) in response of the stochastic system deterioration. …”
Article
