Search Results - (( modification location based algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…Proposed modifications to two existing algorithms, based on mode shape, for locating of damage in a beam like structure model are presented in this paper. …”
    Get full text
    Get full text
    Article
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Shortest Path Trajectory System Based on Dijkstra Algorithm by Putri, Indah Pratiwi

    Published 2012
    “…This project includes the modification of main algorithm which has been implemented in the prototype development. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…Indoor localisation techniques in multi-floor environments are emerging for location based service applications. Developing an accurate location determination and time-efficient technique is crucial for online location estimation of the multi-floor localisation system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Harmony search algorithm for curriculum-based course timetabling problem by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2013
    “…With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Harmony search algorithm for curriculum-based course timetabling problem by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2013
    “…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. Using two different watermarks lead to a good classification of incidental and malicious modifications and locating the tampered areas. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…The proposed work has been compared to GA-based technique, module modification technique and Simulated Annealing technique related to QR code readability, embedded logo visual quality and high embedded data capacity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…In mobile environment, when the source is mobile and migrates to a new location, the multicast tree needs to be rebuilt. AMTree is an active network based protocol intended to make the sending packets to the tree after source migration an efficient process without much modifications to the multicast tree. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Eccentricity Optimization of NGB System by using Multi-Objective Genetic Algorithm by Yazdi, H.M., Ramli Sulong, N.H.

    Published 2009
    “…Boundary equations are set by introducing feasible area to avoid improper individuals followed by utilization of some operators such as selection, mutation, crossover and elite genetic algorithm. Based on the plain aggregate approaches for transforming the objective vector in scalar, some modifications are proposed to assist designers in making decision on prioritizing between the frame stiffness and brace frame weight in their design.…”
    Get full text
    Get full text
    Article
  15. 15

    Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau by Tan , Chee Hau

    Published 2020
    “…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Balancing exploration and exploitation in ACS algorithms for data clustering by Jabbar, Ayad Mohammed, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…Several conventional adaptive distance relay (ADR) and computational based intelligent modifications presented to solve the impending compromise by using faulted line voltage and current parameters for the various protection relay controller modification, optimizing synchronized measurement to block or limit the fault current penetration into the grid. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Supervised evolutionary programming based technique for multi-DG installation in distribution system by Shaari M.F., Musirin I., Nazer M.F.M., Jelani S., Jamaludin F.A., Mansor M.H., Kumar A.V.S.

    Published 2023
    “…Installing DG in network system, has supported the distribution system to provide the increasing number of consumer demand and load, in order to achieve that this paper presents an efficient and fast converging optimization technique based on a modification of traditional evolutionary programming method for obtain the finest optimal location and power loss in distribution systems. …”
    Article
  20. 20

    Spiral-based manta ray foraging optimization to optimize PID control of a flexible manipulator by Abd Razak, Ahmad Azwan, Nasir, Ahmad Nor Kasruddin, Abd Ghani, N. M., Mhd Rizal, Nurul Amira, Mat Jusof, Mohd Falfazli, Muhamad, Ikhwan Hafiz

    Published 2020
    “…This paper presents a Spiral-based Manta Ray Foraging Algorithm (SMRFO). It is an improvement of Manta Ray Foraging Algorithm (MRFO). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item