Search Results - (( developing learning context algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…The objective of this research is to develop a tourist mobile application that can be incorporated with machine learning based recommender system. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In order to address the above mentioned challenges, this study is devoted towards the development of a clusterer and a clustering ensemble learning method based on incremental genetic algorithms addressing group unlabeled samples. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
    Article
  9. 9

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…As per the findings, the RF algorithm attained the maximum accuracy of 77% in the context of PIDD. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Based on the result, we developed a prototype tool called detection on ambiguous SRS written in Malay using machine learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Developing computational thinking competencies through constructivist argumentation learning: a problem-solving perspective by Voon, Xin Pei, Wong, Su Luan, Wong, Lung Hsiang, Md Khambari, Mas Nida, Syed Abdullah, Sharifah Intan Sharina

    Published 2022
    “…To nurture higher order thinking skills and to engage effective problem-solvers, our framework incorporates four Computational Thinking-Argumentation design principles to support instructional innovation in the teaching and learning of science at the secondary school level, viz. 1) developing problem-solving competencies and building capability in solving uncertainties throughout scientific inquiry; 2) developing creative thinking and cooperativity through negotiation and evaluation; 3) developing algorithmic thinking in talking and writing; 4) developing critical thinking in the processes of abstraction and generalization.…”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Jawi recognition system by Nur Aziela, Mansor

    Published 2010
    “…From a dominant writing in Malay world, the usage of Jawi is confined mostly in Islamic religious context nowadays. As an initiative to encourage the learning of Jawi, this research proposed Jawi Character Recognition system using Neural Network and Supervised Learning method. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…Consolidation of this theory with other procedures such as risk assessment and text mining has produced a model namely as Risk Concentration for Context Assessment or RiCCA. This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis