Search Results - (( filing implementation tree algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- filing implementation »
- implementation tree »
- java optimization »
- optimization path »
- tree algorithm »
- path algorithm »
-
1
-
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
4
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
5
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
6
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Classification of cervical cancer using random forest
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), KNearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. …”
Get full text
Get full text
Get full text
Article -
9
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), KNearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. …”
Get full text
Get full text
Article -
10
Pixel-based feature for android malware family classification using machine learning algorithms
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim
Published 2023“…The models are based on the four machine learning algorithms: logistic regression, support vector machine, decision tree, and neural network; two ensemble techniques: adaptive boost and bootstrap aggregation; three deep learning algorithms: recurrent neural network, long short-term memory(LSTM), and gated recurrent unit (GRU). …”
Get full text
Get full text
Thesis -
12
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
13
Evaluation of XML documents queries based on native XML database
Published 2016“…This study is to evaluate the Native XML database (NXD) performance in a comparison with XML_Enabled Database (XED), and then to ellhance· Entity Relationship (ER) algorithm of the relational schema for the improvement of Insert, Delete, Update and Search XML document (XML files with a large number of elements) and finally, to validate the algorithm in NXD and compare the performance ofXED and NXD, by implementing the same command and control data model. …”
Get full text
Get full text
Thesis
