Search Results - (( java implementation path algorithm ) OR ( using values using algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- using algorithm »
- path algorithm »
- using values »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Enhance key generation algorithm based user string identity as public key
Published 2015“…Only odd decimal values can be used in a public key using the Tripathi algorithm. …”
Get full text
Get full text
Thesis -
6
Extensions to the K-AMH algorithm for numerical clustering
Published 2018“…The original k-AMH algorithm for categorical values uses a simple matching dissimilarity measure, but for numerical values it uses Euclidean distance. …”
Get full text
Get full text
Get full text
Article -
7
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…This method basically will help to improve the storage capacity and efficiency. The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
Get full text
Get full text
Thesis -
8
Enhancing latent semantic analysis (LSA) using tagging algorithm in retrieving Malay documents / Afiqah Bazlla Md Soom
Published 2018“…Outcomes of this study indicate that by using tagging algorithm, the recall value of the LSA algorithm can be enhanced up to 4% , the precision value also can be enhanced up to 16% and the F-measure value of LSA retrieval result can be enhanced by approximately up to 7% compared to LSA retrieval result without tagging algorithm. …”
Get full text
Get full text
Thesis -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
10
Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail
Published 2021“…The algorithm used to develop a product recommendation engine is collaborative filtering algorithm and this algorithm is written in python. …”
Get full text
Get full text
Thesis -
11
An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic
Published 2004“…CQ Routing Algorithm evaluates how confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm for adaptive packet routing in communication networks. …”
Get full text
Get full text
Get full text
Article -
12
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…In CQ Routing Algorithm, the confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm. …”
Get full text
Get full text
Thesis -
13
Modeling of widely-linear quaternion valued systems using hypercomplex algorithms
Published 2015“…The data-driven optimal modeling and identification of widely-linear quaternion-valued synthetic systems is achieved by using a quaternion-valued gradient based algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…These values can be benchmarked in solving multi-objective GMS problems using the multi-objective PACS algorithm and its variants.…”
Get full text
Get full text
Get full text
Article -
15
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
16
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Other than that, the proposed HFP+CI current control algorithms has resulted better performance with the lowest current ripple, Total Harmonic Distortion (THD) values, and power loss than using Fuzzy-PI and Crisp-PI current control algorithms. …”
Get full text
Get full text
Thesis -
17
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The proposed algorithms were used to generate PM10 and AOT maps for the study areas. …”
Get full text
Get full text
Thesis -
18
Optimization of fast fourier transform based on twiddle factor using genetic algorithm on raspberry pi
Published 2019“…However, both Signal to Noise Ratio (SNR) and Switching Activity (SA) values depend on the word length of the FFT processor, the bigger the word length of the FFT processor will result in a higher value for the SNR and the SA, Thus, this research aims to reduce the power consumption of the FFT processor by lowering the word length of Twiddle Factor for the FFT by using both Single Objective Genetic Algorithm (SOGA) and Multi-Objective Genetic Algorithm (MOGA) to find the optimum results for SNR and SA values while lowering the Word Length. …”
Get full text
Get full text
Thesis -
19
Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy
Published 2014“…A new approach of CS and WDO algorithm is used for selection of optimal threshold value. …”
Get full text
Get full text
Article -
20
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
Published 2012“…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm and Yang's algorithm using Peak signal�to-noise ratio (PSNR). …”
Get full text
Get full text
Get full text
Thesis
