Search Results - (( developing emerging path algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- developing emerging »
- java implementation »
- learning algorithm »
- path algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Three-dimensional coverage control for multi-unmanned aerial vehicle
Published 2024“…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
Laser simulator: a novel search graph-based path planning approach
Published 2018“…A novel technique called laser simulator approach for visibility search graph-based path planning has been developed in this article to determine the optimum collision-free path in unknown environment. …”
Get full text
Get full text
Get full text
Article -
8
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…One contribution of this thesis is developing an efficient technique for detecting automatically infeasible paths that contain transitions with conflicted OCL constraints. …”
Get full text
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…The repeatability tests shown that the developed navigation algorithm able the robot to reach the target with the similar navigation path pattern outcome in each simulation tests. …”
Get full text
Get full text
Thesis -
11
Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems
Published 2025“…In this paper, we propose the Geometric Reinforcement Learning Algorithm (GRLA), a unified framework for joint path planning and task scheduling in multi-UAV MEC systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
-
14
Path planning methods for autonomous vehicles at intersections: A review
Published 2026“…Overall, this review aims to support the development of AV path planning, ultimately contributing to safer and more efficient autonomous systems in urban environments.…”
Get full text
Get full text
Get full text
Article -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
A microscopic swarm model simulation and fractal approach towards swarm agent behaviour
Published 2006“…The collision avoidance algorithm is influenced by existing algorithm flock which uses the steering behaviour to animate birds. …”
Get full text
Get full text
Get full text
Article -
17
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Hereby, the Dijkstra’s algorithm is tested with the developed 3D navigation network inside the building model. …”
Get full text
Get full text
Get full text
Thesis -
18
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Fingerprint frontier: the evolution of biometric security
Published 2023“…Chapter Seven, "Best Practice in Fingerprint Security," emerges as a guiding light, delivering complete methods and procedures for developing and maintaining safe fingerprint systems, with a steadfast dedication to not simply identifying issues but also offering answers. …”
Get full text
Get full text
Get full text
Book -
20
Performance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Published 2019“…Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. …”
Get full text
Get full text
Get full text
Article
