Search Results - (( java implementation path algorithm ) OR ( using wide using algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- using algorithm »
- path algorithm »
- using wide »
- wide using »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Modeling of widely-linear quaternion valued systems using hypercomplex algorithms
Published 2015“…The data-driven optimal modeling and identification of widely-linear quaternion-valued synthetic systems is achieved by using a quaternion-valued gradient based algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
6
Adam optimization algorithm for wide and deep neural network
Published 2019Get full text
Get full text
Article -
7
Genetic Algorithm for Web Data Mining
Published 2001“…By doing so, it could assist the process of data mining for information in the World Wide Web. This study used a prototype program based on genetic algorithm to manipulate the initial set of data. …”
Get full text
Get full text
Project Paper Report -
8
-
9
Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur
Published 2007“…Web based learning environment has been widely developed and adopted. Many of us use the internet or the "web" (World Wide Web) as a source of information. …”
Get full text
Get full text
Thesis -
10
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The performance of the proposed algorithms are compared with quaternion least mean square QLMS, zero-attract quaternion least mean square ZA-QLMS, and widely linear quaternion least mean square WL-QLMS algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
Get full text
Get full text
Thesis -
12
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007“…Traveling salesman problem is finding is the shortest path connecting number of locations such as cities, visited by a traveling salesman on his sales route. TSP has been used in The Two-Period Travelling Salesman Problem Applied to Milk Collection in Ireland and Usefulness of Solution Algorithms of the Travelling Salesman Problem in the typing of Biological Sequences in a Clinical Laboratory Setting.…”
Get full text
Get full text
Final Year Project -
13
Novel wide-area fault location and predictive maintenance technique for distribution system
Published 2023“…This paper presents a reliable, automated fault location algorithm within a wide-area distribution network using a limited number of monitoring devices. …”
Article -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
Detection and extraction features for signatures images via different techniques
Published 2019“…In this paper, three widely used feature detection algorithms, SURF, BRISK and FAST, these algorithms are compared to calculate the processing time and accuracy for set of signatures correctly. …”
Get full text
Get full text
Conference or Workshop Item -
16
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…For higher orders like Transcendental Equation, Numerical Methods is used to find the solutions. Genetic algorithm (GA) has long been used for optimization problems that arise in a wide variety of complex systems. …”
Get full text
Get full text
Thesis -
17
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…Each robot has a limited view of the environment, and they communicate with their neighbouring robots to share information about their current position. The proposed algorithm was developed using MATLAB and implemented within ROS2, which are widely used in the robotics industry. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
SVD-gorank: Recommender system algorithm using SVD and gower's ranking
Published 2025“…Recommender systems using ranking-oriented collaborative filtering are currently widely used. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
20
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data are used in the investigation. Comparisons based on widely used optimization performance indicators along with outcomes from other research are used. …”
Get full text
Get full text
Article
