Search Results - (( things application _ algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Vulnerability detection algorithm of lightweight linux internet of things application with symbolic execution method by Li, Hongrui

    Published 2021
    “…Vulnerability detection algorithm of lightweight linux internet of things application with symbolic execution method by Li, Hongrui…”
    Get full text
    article
  6. 6

    Intelligent Multi-cellular Network Connectivity for Internet of Things Applications by Gsangaya K.R., Hajjaj S.S.H., Hashim W., Razali R.A.

    Published 2023
    “…Cost effectiveness; Mobile telecommunication systems; Modems; Quality of service; Wireless networks; Cellular network; Computing devices; Internet of thing application; Internet of thing networking; Network connectivity; Network selection; Network selection algorithm; Prototype modem; Selection algorithm; Single-networks; Internet of things…”
    Conference Paper
  7. 7
  8. 8
  9. 9

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Security factors based evaluation of verification algorithm for an IoT access system by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…Soft computing; Internet of Things (IOT); QR tag; Security Architecture; Security factors; Security objectives; Smart access; Smart city applications; Verification algorithms; Internet of things…”
    Conference Paper
  12. 12

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things by Bakhshad, Said, Noor, Rafidah Md, Akhundzada, Adnan, Saba, Tanzila, Ahmedy, Ismail, Haroon, Faisal, Nazir, Babar

    Published 2018
    “…The simulation of the proposed algorithm shows promising results and better performance compared to the current state-of-the-art Modified Dynamic Hierarchical Replication (MDHR) algorithm. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…In more recent research, there have been theoretical proposals to virtualize constrained devices to abstract their data so that its always available to applications. We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20