Search Results - (( java implementation ((phase algorithm) OR (path algorithm)) ) OR ( using self using algorithm ))
Search alternatives:
- java implementation »
- phase algorithm »
- using algorithm »
- path algorithm »
- self using »
-
1
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
6
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
7
Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm
Published 2018“…Many researchers dealing with smartphone sensors to recognize human activities using machine learning algorithms. In this paper, we proposed One-versus-All (OVA) strategy with relief-f and self-adaptive algorithm to recognize these activities. …”
Get full text
Get full text
Conference or Workshop Item -
8
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
9
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
Published 2006“…In this project, we have used the Successive random algorithm (SRA). Then, we have decided to use Variance time plot and R/S statistics as our statistical analysis tools. …”
Get full text
Get full text
Thesis -
10
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
Get full text
Get full text
Student Project -
11
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
12
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…Two multiple selection algorithm, which are known as “static filter range selection algorithm” and “self-scalable selection algorithm” are proposed. …”
Get full text
Get full text
Thesis -
13
Exploring dynamic self-adaptive populations in differential evolution
Published 2006“…Using De Jong's F1-F5 benchmark test problems, we showed that DE with self-adaptive populations produced highly competitive results compared to a conventional DE algorithm with static populations. …”
Get full text
Get full text
Get full text
Article -
14
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
Published 2010“…The abnormal activities are prevented and healed by the presented algorithms. We show how the use of biological immune systems, which incorporate an innate, adaptive immune system and self-healing mechanism, can reduce the number of false alerts and heal the damage caused by intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
15
A fault syndromes simulator for random access memories
Published 2008“…At present, the March test algorithm is used to detect and diagnose all faults related to Random Access Memories. …”
Get full text
Get full text
Article -
16
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…Previous works of self-charging algorithms were focused only for steady-state operation by using either proportional-integral (PI) or fuzzy logic control (FLC). …”
Get full text
Get full text
Get full text
Article -
17
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, SelfOrganizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
PID Tuning Method Using Chaotic Safe Experimentation Dynamics Algorithm for Elastic Joint Manipulator
Published 2021“…CSEDA was a modified version of the safe experimentation dynamics algorithm (SEDA) that used a chaos function in the updated equation. …”
Get full text
Get full text
Get full text
Article -
20
The use of SOM for fingerprint classification
Published 2023“…This paper introduces an approach to fingerprint classification by using Self-Organizing Maps (SOM). In order to be able to deal with fingerprint images having distorted regions, the SOM learning and classification algorithms are modified. …”
Conference paper
