Search Results - (( developing validation technique algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- developing validation »
- validation technique »
- java implementation »
- implementation path »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…This architecture is based on the combination of three well-known techniques, namely, artificial neural networks, fuzzy logic and genetic algorithm. …”
thesis::doctoral thesis -
6
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…The Linear-PSO algorithm was the first version of improvement. However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
Get full text
Get full text
Thesis -
7
DEVELOPMENT OF A FATIGUE DAMAGE MONITORING SYSTEM USING DIGITAL IMAGE CORRELATION
Published 2017“…Next, validation works were carried out to verify the algorithm, imaging system and the digital image correlation (DIC) technique. …”
Get full text
Get full text
Thesis -
8
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
Get full text
Get full text
Get full text
Thesis -
9
Design and Development of Hybrid Maximum Power Point Tracking Algorithm for Photovoltaic Cell
Published 2013“…Moreover designed algorithm is developed using matlab and will be validate using real time data from the PV cell and the output will be compared with current algorithms.…”
Get full text
Get full text
Final Year Project -
10
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…This paper describes the development and validation of landslides susceptibility models for mountainous regions using advanced data mining techniques. …”
Get full text
Get full text
Article -
11
A Study On Gene Selection And Classification Algorithms For Classification Of Microarray Gene Expression Data
Published 2005“…The Performance Of The Combined Techniques Is Validated By Using Leave-One-Out Cross Validation (Loocv) Technique And Receiver Operating Characteristic (Roc) Is Used To Analyze The Results. …”
Get full text
Get full text
Get full text
Article -
12
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The developed algorithms are two-band algorithm, terma linear and modified algorithm from the combination of the visible and infrared thermal bands. …”
Get full text
Get full text
Thesis -
13
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis -
14
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017“…Face recognition has been considered as a popular technique to recognise identity of a person. Many face recognition algorithms have been developed and modified by researchers. …”
Get full text
Get full text
Monograph -
15
Improved Boosted Decision Tree Algorithms by Adaptive Apriori and Post-Pruning for Predicting Obstructive Sleep Apnea
Published 2018“…The improved version of Boosted Decision Tree algorithm, named as Boosted Adaptive Apriori post-Pruned Decision Tree (Boosted AApoP-DT), was developed by referring to Adaptive Apriori (AA) properties and by using post-pruning technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
18
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…The performance of the algorithm is validated by using the developed database under four luminance intensities and achieved promising results. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Discrete-time system identification using genetic algorithm with single parent-based mating technique
Published 2024“…The methodology encompasses data acquisition, GA program development, SPM technique implementation, and simulation using MATLAB. …”
Get full text
Get full text
Get full text
Thesis
