Search Results - (( using personal path algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- path algorithm »
- personal path »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
-
3
An application of Floyd-Warshall Algortihm in finding shortest path of order picker in warehouse / Saidatul Aisyah Roslan, Siti Norhakimah Mohd Yatim and Siti Sarah Sulaiman
Published 2019“…For the result, shortest path for the order pickers in iterations. The algorithm used can help the order picker to have the shortest path, but it have no direct path. …”
Get full text
Get full text
Student Project -
4
Exploratory Study on Navigation System for Visually Impaired Person
Published 2013“…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
Get full text
Get full text
Article -
5
Performance Study of Developed SMART EYE for Visually Impaired Person.
Published 2013“…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
Get full text
Get full text
Article -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. …”
Get full text
Get full text
Conference or Workshop Item -
8
Improved tree routing protocol in zigbee networks
Published 2010“…Packets are forwarded to neighbour node if the path to the sink through neighbour node is shorter than the path through personal area network (PAN) coordinator. …”
Get full text
Get full text
Thesis -
9
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…For this issue, this study proposes using the naïve approach prune algorithm and using Personal agents to reduce the reachability time in calculating between the nodes and to remove unnecessary edges, minimizing the attack graph’s complexity. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
14
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…Few electronic components such as PICs, IR sensors, push buttons, LEDs, LCDs, counters, comparators, and servo motors have been used to realize the system. Personal computer and DAQ cards are used to communicate and interface with the monitor to display the GUI which has been developed using Lab View. …”
Get full text
Get full text
Get full text
Article -
15
Slam-based mapping for object recognition
Published 2018“…After a map of the unknown environment is built, the Adaptive Monte Carlo Localization (AMCL) is used to localize the robot and Dijkstra’s algorithm is deployed to compute the shortest path to the destination goal. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Proposal for ontology based approach to fuzzy student model design
Published 2014“…Intelligent tutoring system (ITS) is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide an adaptive and personalized tutoring suitable to each individual student based on his/her profile or characteristics. …”
Get full text
Get full text
Conference or Workshop Item -
17
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module
Published 2001“…There are three ways to control the mobile robot manually (Manual Run, Path Run and Paths Run). For automatic-run, the mobile robot can be controlled using two ways (Run File and Timer). …”
Get full text
Get full text
Thesis -
19
Ontology based approach to Fuzzy student model design
Published 2014“…ITS is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide a personalized tutoring adaptable to each student based on his/her profile or characteristics. …”
Get full text
Get full text
Article -
20
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Compromised accounts can be used to spread misinformation, launch phishing attacks, and steal personal information. …”
Get full text
Get full text
Get full text
Get full text
Article
