Search Results - (( developing making techniques algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The proposed technique has improved the algorithm by incorporating an autonomous decision making, that makes the binarization technique a scale invariant algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis by Mukhlis, Siti Farah Najwa

    Published 2017
    “…This project is about developing a Dam Haji game using A* search algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman by Isman, Muhammad Iskandar

    Published 2017
    “…In the future work, this research will discover more method related to ACO technique to make more optimize and develop a complete system for the organization used.…”
    Get full text
    Get full text
    Thesis
  9. 9

    An enhanced soft set data reduction using decision partition order technique by Mohammed, Mohammed Adam Taheir

    Published 2017
    “…Nowadays, redundant data is one of the open issues due to the rapid development of technologies. This issue is more visible especially in decision-making as the behaviour of such data is more complex and due to the uncertainty during a process of decision making. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Prediction of UPSR Result using clonal selection algorithm (PUR) / Muhammed Khaleeq Shafii by Shafii, Muhammed Khaleeq

    Published 2012
    “…This project also can be improved by make a comparative study on Artificial Immune System and other techniques or algorithms that can be used to solve predict actual UPSR grade. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…The integration of artificial intelligence techniques is becoming necessary for environmental risk assessment systems and decision-making, particularly under the limitations of individual intelligence techniques. …”
    thesis::doctoral thesis
  15. 15

    Rule based signal processing for ambulatory fetal monitoring by Mohd Ali, Mohd Alauddin, Ibrahimy, Muhammad Ibn, Zahedi, Admond

    Published 2004
    “…The technique has been developed through a combination and modification of earlier techniques making it suitable for ambulatory monitoring. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Box-jenkins and genetic algorithm hybrid model for electricity forecasting system by Mahpol, Khairil Asmani

    Published 2005
    “…In making a forecast for energy demand, accuracy is the primary criteria in selecting among forecasting techniques. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of indexer considering tag weighting for XML document / Masliana Wahid @ Buang by Wahid @ Buang, Masliana

    Published 2005
    “…This research is used the inverted file method for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy based technique for microchip lead inspection using machine vision by Hawari, Yasser, Salami, Momoh Jimoh Emiyoka, Aburas, Abdurazzag Ali

    Published 2008
    “…This research develops a fuzzy based algorithm for microchip image lead Inspection. …”
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Automated time series forecasting by Ismail, Suzilah, Zakaria, Rohaiza, Tuan Muda, Tuan Zalizam

    Published 2011
    “…While quantitative technique is based on statistical concepts and requires large amount of data in order to formulate the mathematical models.This technique can be classified into projective and causal technique.The projective technique (or univariate modelling) just involve one variable while the causal technique (or econometric modelling) suitable for multi-variables.Since forecasting involves uncertainty, several methods need to be executed on one set of time series data in order to produce accurate forecast.Hence, usually in practice forecaster need to use several softwares to obtain the forecast values.If this practice can be transformed into algorithm (well-defined rules for solving a problem) and then the algorithm can be transformed into a computer program, less time will be needed to compute the forecast values where in business world time is money.In this study, we focused on algorithm development for univariate forecasting techniques only and will expand towards econometric modelling in the future.Two set of simulated data (yearly and non-yearly) and several univariate forecasting techniques (i.e. …”
    Get full text
    Get full text
    Get full text
    Monograph
  20. 20

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…This study also shows that Ant Colony Optimization is a suitable technique in developing the classification model. Besides, the Ant-Miner algorithm is suitable in this study because it can train the data for many times to obtain the highest percentage of accuracy for developing the classification model to predict the attackers of online shaming. …”
    Get full text
    Get full text
    Thesis