Search Results - (( users selection path algorithm ) OR ( java applications testing algorithm ))

Refine Results
  1. 1

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria by Ting, Kien Hua, Noraini Abdullah

    Published 2018
    “…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Shortest Path Routing Using Heuristic Search by Alaiwan, Ahmed Omran A.

    Published 2006
    “…In this project A* algorithm was used, to suggest shortest path model between two selected points to find the fastest and shortest route on Malaysia map. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…In order to ensure that the 3D path planning algorithms are computationally efficient, the proposed 2D path planning algorithms are applied into them. …”
    Get full text
    Get full text
    Thesis
  5. 5

    AUTOMATIC ROUTE FINDER FOR NEW VISITORS by ADNAN, MOHD SHIHAM

    Published 2006
    “…The user is first need to select the starting location and the ending destination then the shortest path will be highlighted with the total distance between the two locations. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Path planning for visually impaired people in an unfamiliar environment using particle swarm optimization by Yusof, T. S. T., Toha, Siti Fauziah, Md. Yusof, Hazlina

    Published 2015
    “…For the destination selection process, a list of available places is given and the user will select the places that they want to visit from the list. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Multi-user mmWave MIMO channel estimation with hybrid Beamforming over frequency selective fading channels by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Ain, Mohd Fadzil, Abdul Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2020
    “…In this paper, a multi-user channel estimation (CE) scheme namely generalized-block compressed sampling matching pursuit (G-BCoSaMP), is proposed for multi-user mmWave MIMO systems over frequency selective fading channels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    PLANNING OF MULTIPLE FEEDERS ELECTRICAL DISTRIBUTION SYSTEM by NORDIN, AHMAD SOLLEHIN

    Published 2011
    “…In this project, several algorithms are implemented to design an electrical distribution system which are (1) Optimal Feeder Path Algorithm, (2) Modified Load Flow Algorithm, (3) Optimal Branch Conductor Selection Algorithm, and ( 4) Optimal Location of Substation Algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Systematic design of chemical reactors with multiple stages via multi-objective optimization approach by Mohd Fuad, Mohd Nazri, Hussain, Mohd Azlan

    Published 2015
    “…Following the identification of path-dependent design variables, several (possibly conflicting) design objectives will be selected and solutions of the corresponding problem will be generated from multi-objective optimization algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  13. 13

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…All these achieved because the proposed algorithm targets those users located at the cluster borders who more likely cause rank deficiency. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Smart resource tracking and tracing system (SRTTS) by Omar, Emi Normalina, Abu Hassan, Lailatul Faizah, Rochin Demong, Nur Atiqah, Othman, Abdul Kadir, A Rahman, Mohd Khirzan Badzli

    Published 2017
    “…Method used by the system is providing an algorithm on showing the shortest path which will act as a recommender system. …”
    Get full text
    Get full text
    Book Section
  18. 18
  19. 19
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project