Search Results - (( using data ((method algorithm) OR (path algorithm)) ) OR ( java application system algorithm ))
Search alternatives:
- method algorithm »
- java application »
- system algorithm »
- path algorithm »
-
1
An experiment on the performance of shortest path algorithm
Published 2016“…Shortest path algorithms are one of the main algorithms used in most navigation system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…There are many algorithms that used to solve this problem. In this study, ant algorithms are used to find the shortest path using a real data. …”
Get full text
Get full text
Get full text
Thesis -
3
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
5
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
6
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The proposed method uses a rank accuracy estimation model to decide the rank-1 value to be applied for the decomposition. …”
Get full text
Get full text
Article -
8
-
9
Novel algorithm for mobile robot path planning in constrained environment
Published 2021“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
12
Repetitive mutations in genetic algorithm for software test data generations
Published 2022“…One of the white box testing techniques is path coverage testing. Genetic Algorithm (GA) has proven to be an important method in generating test data for automatic path coverage testing. …”
Get full text
Get full text
Thesis -
13
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Article -
14
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Article -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
16
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
FROM IMAGE TO GRAPH-BASED DATA FOR PATH PLANNING
Published 2019“…Path planning is one of methods that have been used in finding ways from one point to another. …”
Get full text
Get full text
Final Year Project
