Search Results - (( next generation using algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- generation using »
- using algorithm »
- path algorithm »
- next »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…In the last experiment, the results showed that DE and EP algorithms can generate superior controllers whilst PDE is only capable to generate sub-optimal controllers. …”
Get full text
Get full text
Get full text
Thesis -
6
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…For this issue, this study proposes using the naïve approach prune algorithm and using Personal agents to reduce the reachability time in calculating between the nodes and to remove unnecessary edges, minimizing the attack graph’s complexity. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
8
Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks
Published 2017“…This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). …”
Get full text
Get full text
Get full text
Article -
9
Design of an Ultra High Speed AES Processor for Next Generation IT Security.
Published 2011“…The proposed design addresses the next generation IT security requirements: the resistance against all crypto-analytical attacks and high speed with low latency. …”
Get full text
Get full text
Article -
10
Trajectory planning and simulation for 3d printing process
Published 2022“…The output of slicing algorithm will be used as input of infill generator to generate infill vertices based on the infill density and infill pattern that decided by users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Performance analysis of bacterial genome assemblers using illumina next generation sequencing data / Nur ‘ Ain Mohd Ishak
Published 2020“…The advancement of next generation sequencing (NGS) technology has revolutionized the field of genomic and genetic studies. …”
Get full text
Get full text
Get full text
Thesis -
12
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
13
Reliability assessment of power generation systems using intelligent search based on disparity theory
Published 2017“…The simulation result shows the DEGA can generate a larger variety of the individuals in an early stage of the next population generation. …”
Get full text
Get full text
Get full text
Article -
14
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…The next-generation cyber defense that relies on predictive analysis is more proactive than existing technologies that rely on intrusion detection. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Comparison between alpha beta pruning algorithm and greedy algorithm in designing winning strategies in the game of checkers / Christy Jr Tan
Published 2007“…The algorithm is useful in some of the game search available today. …”
Get full text
Get full text
Student Project -
18
Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq
Published 2016“…The GAOM achieved an increase in hydropower generation in 17 scenarios using these two algorithms, with the Salg being superior in all scenarios. …”
Get full text
Get full text
Get full text
Article -
19
Reliability Assessment of Power Generation Systems Using Intelligent Search Based on Disparity Theory
Published 2017“…The simulation result shows the DEGA can generate a larger variety of the individuals in an early stage of the next population generation. …”
Get full text
Get full text
Get full text
Article -
20
Optimization of ship routing using hybrid genetic algorithm / Ismail
Published 2014“…The second experiment is to generate routes using three algorithms discussed in the research. …”
Get full text
Get full text
Thesis
