Search Results - (( java application _ algorithm ) OR ( user evaluation ((method algorithm) OR (path algorithm)) ))
Search alternatives:
- java application »
- method algorithm »
- user evaluation »
- path algorithm »
-
1
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017“…This project use usability test for user testing system and functionality test to evaluate the efficiency of the game. …”
Get full text
Get full text
Thesis -
4
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…By using the MATLAB simulation tool,the performance of SPF algorithm and conventional method will be evaluated. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In order to evaluate the performance of the proposed methods, a MATLAB Graphical User Interface (GUI) is created to plot the targeted and real path of the robot. …”
Get full text
Get full text
Monograph -
6
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…Questionnaire and interview methods is used to gather user's requirement from campus students and campus counsellors. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Discrete simulation framework for wireless cellular networks.
Published 2008“…The simulator is built from the scratch to enable customization requirements of any research and to provide the freedom to understand, configure protocol modules, draw desired topologies and specifies the movement paths of the mobile users and to plot the necessary performance graphs. …”
Get full text
Get full text
Article -
9
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
The Effect of Rainfall on the UAV Placement for 5G Spectrum in Malaysia
Published 2023“…The problem of finding the UAV 3D placement is formulated with the objective to minimize the total path loss between the UAV and all users. The problem is solved by invoking two algorithms, namely Particle Swarm Optimization (PSO) and Gradient Descent (GD) algorithms. …”
Article -
12
Vision-based robot indoor navigation
Published 2022“…An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Compared to manual mobile robots, AGRs require sensors and control systems that generate feedback for the re-evaluation of an unexpected situation and to detect obstacles in the path the AGR is required to follow. …”
Get full text
Get full text
Final Year Project -
14
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…This research shows that packet loss has a more significant influence when measured over the proposed methods and algorithms, as well as delay and energy consumption during the evaluation stage. …”
Get full text
Get full text
Get full text
Thesis -
15
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
16
Design of A unmanned aerial vehicles assisted search and rescue collaboration architecture for emergency communication systems / Abdu Ahmed Saif Ahmed
Published 2022“…Simulation results indicate that the proposed algorithms can significantly reduce the outage probability and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
17
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2015“…While some scheduling algorithm take the moderate path but still be lacking especially in Edge Cell User Throughput necessitating the use of Relays or femtocells.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2014“…While some scheduling algorithm take the moderate path but still be lacking especially in Edge Cell User Throughput necessitating the use of Relays or femtocells.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A Compromise Programming to Task Assignment Problem in Software Development Project
Published 2021“…We designed a genetic algorithm scheme to solve the transformed problem. …”
Get full text
Get full text
Article -
20
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
