Search Results - (( developing social method algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- developing social »
- method algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…The developed fake news detection model is tested on the PHEME dataset by conducting several experiments against different baseline methods. …”
Get full text
Get full text
Get full text
Thesis -
6
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…Sustainable development is a problem-solving method that simultaneously accounts for the economic, environmental, and social impacts of actions. …”
Get full text
Get full text
Article -
7
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
8
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. …”
Get full text
Get full text
Article -
9
-
10
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
11
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…This method is a combination of developing trust network based on user interest similarity and trust network from social network analysis. …”
Get full text
Get full text
Get full text
Article -
12
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…Hence, this study aims to develop the dynamic configuration algorithm to provide an optimal support assignment based on information generated from both social support recipient and provision computational models. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Analysis Of Human Detection Method In Social Distancing Monitoring
Published 2022“…This study aims to analyze human detection using the deep learning method in various positions and to develop social distancing detection using the proposed method. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
The forecasting of poverty using the ensemble learning classification methods
Published 2023“…Poverty is a social-cultural problem that can be categorized into monetary approach, capability approach, social exclusion, and participatory poverty assessment. …”
Get full text
Get full text
Get full text
Article -
16
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). Methods: A voluntary sample of 600 participants, aged 15 to 29, was recruited. …”
Get full text
Get full text
Get full text
Article -
17
Analysis of Travellers’ Online Reviews in Social Networking Sites Using Fuzzy Logic Approach
Published 2019“…To develop the recommendation method, we use clustering and prediction machine learning techniques. …”
Get full text
Get full text
Article -
18
Indoor Navigation Algorithm For Mobile Robot
Published 2016Get full text
Get full text
Book Section -
19
A Method For Solving Mult-Objective Optimization Problem: Vector Evaluated Genetic Algorithm (Vega)
Published 2009Get full text
Get full text
Final Year Project Report / IMRAD -
20
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis
