Search Results - (( java implementation path algorithm ) OR ( using tell using algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- using algorithm »
- path algorithm »
- using tell »
- tell using »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Texture recognition by using artificial neural network
Published 2013“…There are thirteen types of Brodatz textures are considered as the dataset for this research and five sets for each type texture with different level of histogram equalized, noise for the training dataset. Backpropagation algorithm is one of the methods for the ANN. After the feature is obtained from the dataset, the feature will be trained and classifier by using theBack-propagation algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
6
The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman.
Published 2007“…The demodulator does not tell the decoder how reliable this decision is. An important feature of the Dorsch algorithm is that it uses soft decision decoding. …”
Get full text
Get full text
Research Reports -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
New accountant job market reform by computer algorithm: an experimental study
Published 2017“…Job recruitment activities for new accountants in Japan change every year.This study proposes modifying these job recruitment activities by combining computer and human efforts.Furthermore, the study formulates the job recruitment activities by using a model and conducting experiments.As a result, the Deferred Acceptance (DA) algorithm derives a high truth-telling percentage, a stable matching percentage, and greater efficiency compared with the previous approach.This suggests the potential of the Deferred Acceptance algorithm as a replacement for current approaches.In terms of accurate percentage and stability, the DA algorithm is superior to the current methods and should be adopted.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
10
Generation of self similar network traffic using DFGN algorithm / Che Ku Noreymie Che Ku Jusoh
Published 2006“…This thesis discusses the generation of network traffic using discrete Fractional Gaussian Noise (dFGN) algorithm. …”
Get full text
Get full text
Thesis -
11
Simulation of droplet coalesce using lattice Boltzmann method
Published 2009“…By doing this, it will tell the characteristic of the liquid and gas phase. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
13
-
14
ARDUINO-BASED FALL DETECTION AND ALERT SYSTEM
Published 2017“…Accelerometer and gyro sensor is used to tell the Arduino any changes in the elder’s activity that exceeds the threshold that has been set. …”
Get full text
Get full text
Final Year Project -
15
Simulation of phase separation phenomenon using lattice boltzmann methods
Published 2009“…By doing this, it will tell the characteristic of the liquid and gas phase. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Obstacle avoidance legged robot
Published 2008“…A PIC Microcontroller has been implemented to act as a brain for the robot that controls the walking and turning algorithm. Ultrasonic sensor was also developed to act as an ‘eye’ to the system and tells the brain about existence of obstacle in front. …”
Get full text
Get full text
Undergraduates Project Papers -
17
A Metaheuristic Optimization Using Explosion Method On A Hybrid Pd2-Lqr Quadcopter Controller
Published 2021“…Conventionally, the controller’s gains were tuned using the trial-anderror method. The problem with this method was that it very time-consuming, and the control designer could never tell which gains are the optimal solution for the controller. …”
Get full text
Get full text
Thesis -
18
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
Get full text
Get full text
Undergraduates Project Papers -
19
-
20
