Search Results - (( java application mining algorithm ) OR ( after implementation path algorithm ))
Search alternatives:
- after implementation »
- implementation path »
- application mining »
- java application »
- mining algorithm »
- path algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Autonomous path planning robot using geographical information
Published 2008“…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
Get full text
Learning Object -
4
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Implementation of an autonomous mobile robot navigation algorithm using C language
Published 2009“…The objective of the project is to develop navigation algorithm for the autonomous mobile robot. After that, implement the navigation algorithm on the mobile robot and without using the external sensor for navigation of the mobile robot to reach the specified point. …”
Get full text
Get full text
Final Year Project -
7
An application of Floyd-Warshall Algortihm in finding shortest path of order picker in warehouse / Saidatul Aisyah Roslan, Siti Norhakimah Mohd Yatim and Siti Sarah Sulaiman
Published 2019“…Floyd¬ Warshall Algorithm is implemented after both matrices are done. …”
Get full text
Get full text
Student Project -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…The element of Shortest Path First (SPF) Algorithm that is used in a routing protocol will be implemented. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014“…Some obstacles are also located in the arena and the mobile robot must be able to avoid any given obstacles to reach the goal point. After doing all implementation, finally, some comparison between robot mapping and robot edge follower will be done to observe the differences between these algorithms in term of time and path needed.…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak
Published 2018“…However, existing algorithm seems too complicated to be applied. Since there is no technique can enable the quadrotor to implement precision navigation application, the research proposed a Real-Time Optimal Trajectory Correction (ROTC) algorithm. …”
Get full text
Get full text
Thesis -
14
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Minimization of traveling time for courier services using Floyd-Warshall algorithm (case study in Seremban 3) / Nur Haifa Nadhira Mohd Hisham, Norfatehah Hairuddin and Wan Nur Amir...
Published 2023“…A Floyd-Warshall algorithm is implemented after both matrices have been completed. …”
Get full text
Get full text
Student Project -
16
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…After the computation completes, the traceback unit will go back to the previous memory path to read and decode the minimum path metrics that have been stored by ACS unit. …”
Get full text
Get full text
Get full text
Thesis -
17
ZLS: A next-door lightweight QoS aware location service technique for VANET on highways
Published 2014“…Other than digital maps, Dijkstra or Bellmen ford algorithms at source or intermediate nodes are also used to find shortest path, which is a computationally time consuming activity leading to an extra delay during path finding and before packet transmission. …”
Get full text
Get full text
Conference or Workshop Item -
18
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
19
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In the benchmarking of the SKF and ssSKF algorithms’ performance in solving the 14-hole PCB drill path optimization case study with recent implementations, on average, both algorithms show the ability to converge to the optimal solution at a smaller number of function evaluations compared to the Gravitational Search Algorithm (GSA), Cuckoo Search (CS), and Intelligent Water Drop (IWD), although fall-short to the Taguchi- Genetic Algorithm optimization algorithm.…”
Get full text
Get full text
Thesis -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis
