Search Results - (( its application ((out algorithm) OR (path algorithm)) ) OR ( web applications _ algorithm ))*
Search alternatives:
- web applications »
- its application »
- path algorithm »
- out algorithm »
-
1
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
2
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…For the process module, Ant Colony Optimization (ACO) algorithm was used to find the shortest path. Using ACO, a Railway Shortest Path Planner (RSPP) application will be developed to help user determine their shortest path from one station to another. …”
Get full text
Get full text
Thesis -
3
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
4
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
5
A review of slicing techniques in software engineering
Published 2015“…Process of model based slicing is utilized to extract the desired lump out of slice diagram. This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
7
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
8
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
-
10
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
11
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
12
Design Of Navigation Algorithm For F_Bot For Patrolling Using Fuzzy Logic
Published 2006Get full text
Get full text
Monograph -
13
-
14
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…The research methodology involves problem modeling, algorithm development, and validation. The TSP concept formulated the MDMT problem, representing holes as cities and tools as a salesman in finding the shortest path to develop a mathematical model or fitness function. …”
Get full text
Get full text
Thesis -
15
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Obstacle Detection And Avoidance System
Published 2018“…The algorithm sets to interpret the data obtained from the sensor and makes the decision for the mobile robot to react. …”
Get full text
Get full text
Monograph -
17
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
