Search Results - (( developing nation data algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- data algorithm »
- path algorithm »
- nation data »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Sustainable energy management: Artificial intelligence-based electricity consumption prediction in limited dataset environment for industry applications
Published 2024“…Electricity has been a key driver of global socioeconomic development and sustainability for both developed and developing nations. …”
Get full text
Get full text
Get full text
Article -
6
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
7
Sentiment analysis on national cultural tourism using Linear Support Vector Machine (LSVM) / Nur Haida Hanna Samsuddin
Published 2020“…In future, it is recommended to experiment with different algorithm or kernel of Support Vector Machine. The volume of data should be large as it can generate better result of classification method.…”
Get full text
Get full text
Thesis -
8
Porting SIMRJGSA Algorithms For Mapping And Alignment To Malay-English Bitexts.
Published 2001Get full text
Get full text
Conference or Workshop Item -
9
Secure mobile AES encryptor (SMAE)
Published 2016“…This can be proved where the National Security Agency (NSA) in the United States to encrypt confidential data and information. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…To address these challenges, an innovative Artificial Intelligence-based (AI-based) predictive algorithm has been proposed, leveraging the Cross Industry Standard Process for Data Mining (CRISP-DM) data science framework. …”
Get full text
Get full text
Conference or Workshop Item -
11
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
Get full text
Get full text
Get full text
Article -
12
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
13
A comparative study of deep learning algorithms in univariate and multivariate forecasting of the Malaysian stock market
Published 2023“…This study aims to develop a univariate and multivariate stock market forecasting model using three deep learning algorithms and compare the performance of those models. …”
Get full text
Get full text
Get full text
Article -
14
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…Therefore, this study aims to investigate the best algorithm for data filtration and how to use it to obtain accurate data for measuring TTR. …”
Get full text
Get full text
Get full text
Thesis -
15
Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm
Published 2016“…The charging strategy controls the charging time on the vehicle charging load profile (VCLP). VCLP is developed using MATLAB from the real vehicle travel data from National Household Travel Survey (NHTS). …”
Get full text
Get full text
Undergraduates Project Papers -
16
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
17
Development of Artificial Neural Network (ANN) for lightning prediction under Malaysia environment / Jeremy AK Stewart Bedimbap
Published 2009“…In the proposed method, a three layer back-propagation neural network with Levenberg Marquardt algorithm has been developed and predicts the output data for the next four hours. …”
Get full text
Get full text
Thesis -
18
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…As nations develop and prosper economically, their population ages longer and requires extra healthcare. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item
