Search Results - (( java implementation plan algorithm ) OR ( using usage path algorithm ))

Refine Results
  1. 1

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    The impact of clustering on the average path length in wireless sensor networks by Aziz, A.A., Şekercioğlu, Y. A.

    Published 2015
    “…Clustering algorithms have been widely used in wireless sensor networks for virtual backbone construction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Empirical analysis and optimization suggestions of Peking Opera audience's use intention of Kuaishou app by Shixia, Yang, Alexander, Chelum

    Published 2026
    “…The test of the moderating effect finds that Peking Opera exposure experience produces a significant moderating effect in all paths where independent variables influence usage intention, while age only exerts a specific moderating effect in the paths of effort expectancy and algorithm recommendation on usage intention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Multi-drones energy efficient based path planning optimization using Genetic Algorithm and Gradient Decent approach by Mustafa, Yousra A, Ali, Elmustafa S, Osman, Thana E, Khalifa, Othman Omran, Mohamed, Zainb O, Saeed, Rashid A, Saeed, Mamoon M

    Published 2024
    “…The paper introduces an efficient energy optimization technique for multi-drones through path planning using Genetic Algorithm (GA) and Gradient Descent (GD). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization by Pang, Jia Hong

    Published 2011
    “…This research work involves the implementation of Single Objective Genetic Algorithm (SOGA) and Multi-objectives Genetic Algorithm (MOGA) in a 16-point Radix-4 Single Path Delay Feedback (R4SDF) pipelined Fast Fourier Transform (FFT) processor. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…It minimizes the transmission rate and network lifetime and improves packet latency and energy usage. The proposed novel link establishment communication (NLEC) technique is used to find the dependable routing path against intruder node available in the network. …”
    Get full text
    Get full text
    Article
  12. 12

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari by Sattari, Mohammad Reza Jabbarpour

    Published 2015
    “…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds by Alqaisy, Sarah Abdulrahman Shukur

    Published 2018
    “…Finally, we expected the scheduling algorithms PDC and DCCP to be improve the Cloud resource usage high efficiency in the IaaS Cloud with efficient scheduling for scientific workflow.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
    Get full text
    Get full text
    Thesis