Search Results - (( java implementation ((phase algorithm) OR (path algorithm)) ) OR ( using self using algorithm ))

Refine Results
  1. 1
  2. 2

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran

    Published 2018
    “…Many researchers dealing with smartphone sensors to recognize human activities using machine learning algorithms. In this paper, we proposed One-versus-All (OVA) strategy with relief-f and self-adaptive algorithm to recognize these activities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun by Harun, Hani Hamira

    Published 2006
    “…In this project, we have used the Successive random algorithm (SRA). Then, we have decided to use Variance time plot and R/S statistics as our statistical analysis tools. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini by Saarini, Jumaliah

    Published 2006
    “…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…Two multiple selection algorithm, which are known as “static filter range selection algorithm” and “self-scalable selection algorithm” are proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Exploring dynamic self-adaptive populations in differential evolution by Teo, Jason Tze Wi

    Published 2006
    “…Using De Jong's F1-F5 benchmark test problems, we showed that DE with self-adaptive populations produced highly competitive results compared to a conventional DE algorithm with static populations. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory by Muna, Elsadig, Azween, Abdullah

    Published 2010
    “…The abnormal activities are prevented and healed by the presented algorithms. We show how the use of biological immune systems, which incorporate an innate, adaptive immune system and self-healing mechanism, can reduce the number of false alerts and heal the damage caused by intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…At present, the March test algorithm is used to detect and diagnose all faults related to Random Access Memories. …”
    Get full text
    Get full text
    Article
  16. 16

    DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm by Mohd Zainuri, Muhammad Ammirrul Atiqi, Mohd Radzi, Mohd Amran, Che Soh, Azura, Mariun, Norman, Abd Rahim, Nasrudin

    Published 2016
    “…Previous works of self-charging algorithms were focused only for steady-state operation by using either proportional-integral (PI) or fuzzy logic control (FLC). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…Considering the unsupervised learning algorithms, Self­Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    PID Tuning Method Using Chaotic Safe Experimentation Dynamics Algorithm for Elastic Joint Manipulator by Mohd Ikhmil Fadzrizan, Mohd Hanif, Ahmad, Mohd Ashraf, Jui, Julakha Jahan

    Published 2021
    “…CSEDA was a modified version of the safe experimentation dynamics algorithm (SEDA) that used a chaos function in the updated equation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The use of SOM for fingerprint classification by Turky A.M., Ahmad M.S.

    Published 2023
    “…This paper introduces an approach to fingerprint classification by using Self-Organizing Maps (SOM). In order to be able to deal with fingerprint images having distorted regions, the SOM learning and classification algorithms are modified. …”
    Conference paper