Search Results - (( java implementation path algorithm ) OR ( basic learning support algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- support algorithm »
- path algorithm »
- basic learning »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Traditional schema theory does not support Lamatckian learning, i.e, forcing the genetic representation to match the solution found by the learning algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…Overall, the enhanced approaches performed well and the enhanced learning processes proposed in the current study makes robot learning more effective. …”
Get full text
Get full text
Thesis -
7
-
8
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
Conference Paper -
9
The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer
Published 2023“…The development of ML algorithms in dermatology has been supported lately regarding links to digital data processing (e.g., electronic medical records, Image Archives, omics), quicker computing and cheaper data storage. …”
Get full text
Get full text
Get full text
Article -
10
Campus study buddy : collaborative learning and resource sharing app
Published 2024“…Higher education institutions can use this program to provide students with a platform to collaborate and support each other's learning, creating a collaborative learning environment, promoting knowledge sharing, and improving student academic success. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
DSC766: Text Analytics / College of Computing, Informatics and Mathematics
Published 2020“…However, a number of statistical approaches have been shown to work well for the "shallow" but robust analysis of text data for pattern finding and knowledge discovery. Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
Get full text
Get full text
Get full text
Teaching Resource -
12
A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee
Published 2023“…Any resampling algorithm is not a necessity in the case of this proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Exploiting Features From Triangle Geometry For Digit Recognition
Published 2013“…Experiments will be conducted using supervised learning that are Support Vector Machine (SVM) and Multi-layer Perceptron (MLP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
18
A study on personalized recommender system using social media
Published 2020“…In the research study Naive Bayes Theorem classifier , k-Nearest Neighbor Classifier and Support Vector Machine classifier is used. These machine learning algorithm processes the data set obtained. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…This technique considered useful if it can satisfy both minimum confidence and support. Apriori is a popular algorithm in finding frequent set of items in data and association rule. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Designing an integrated AIOT system for tracking class attendance
Published 2024“…The project aims to develop an automatic facial recognition system that supports artificial intelligence (AI) and the Internet of Things (IoT) for attendance system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
