Search Results - (( data verification learning algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fake news detection: A machine learning approach by Yeoh, Dennis Guan Lee

    Published 2021
    “…Once the dataset was created, several machine learning algorithms were used to train several different models. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…Rough sets theory represents a mathematical approach to vagueness and uncertainty. Data analysis, data reduction, approxi mate classification, machine learning, and discovery of pattern in data are functions performed by a rough sets analysis. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing by Raja Segaran, Bama, Mohd Rum, Siti Nurulain, Hafez Ninggal, Mohd Izuan, Mohd Aris, Teh Noranis

    Published 2025
    “…This literature review explores the integration of blockchain technology and machine learning (ML) to enhance verification processes and reduce fraudulent practices in forest carbon credits. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…The algorithm is extensively evaluated on UCI Machine Learning Repository Database datasets, including one real dataset with state-of-the-art approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Modified spectral clustering algorithm for semisupervised face annotation modeling by Sheng, Gao You

    Published 2025
    “…However, traditional annotation is time-consuming and labor-intensive, making sufficient accurately labeled data hard to obtain. This research addresses this via semi-supervised learning, using semi-supervised clustering to expand datasets with limited labeled samples. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Data Mining Analysis Of Chronic Kidney Disease (CKD) Level by Mohd Harizi, Muhammad Hafizam Afiq

    Published 2022
    “…The CKD case study consists of clinical data records extracted from the UCI Machine Learning Repository domain. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA by Zahari, Taha, Farzad, Tahriri, Siti Zawiah, Md Dawal

    Published 2014
    “…Trapezoidal fuzzy numbers are implemented for variables such as operation and travelling time in order to generate results with higher accuracy and representative of real-case data. An improved genetic algorithm called fuzzy adaptive genetic algorithm (FAGA) is proposed in order to solve this optimization model. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Muda, A. K., Khadijah Wan, Mohd Ghazali

    Published 2013
    “…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
    Get full text
    Get full text
    Student Project
  16. 16

    A comparative evaluation on data transformation approach for artificial speech detection by Choon Beng Tan, Mohd Hanafi Ahmad Hijazi

    Published 2024
    “…Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  17. 17

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Widespread models like Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Evolutionary Strategy (ES) and Population-Based Incremental Learning (PBIL) dealing with the specified problems are also explored and compared. …”
    Get full text
    Get full text
    Thesis
  20. 20