Search Results - (( java implementation path algorithm ) OR ( building process learning algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- learning algorithm »
- building process »
- process learning »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis -
6
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018“…The aim of this paper to build a network anomaly detection system using machine learning algorithms that are efficient, effective and fast processing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Octane number prediction for gasoline blends using convolution neural network / Zhu Yue
Published 2021“…At present, there are many prediction algorithms based on machine learning. According to the "80/20 rule" for building machine learning model, 80% of the time is spent of finding, cleaning, and organizing data, while the remaining 20% for training of the machine learning model. …”
Get full text
Get full text
Get full text
Thesis -
8
Applications of machine learning to friction stir welding process optimization
Published 2020“…Machine learning (ML) is a branch of artificial intelligent which involve the study and development of algorithm for computer to learn from data. …”
Get full text
Get full text
Get full text
Article -
9
An artificial neural network approach in service life prediction of building components in Malaysia based on local environment and building service load
Published 2007“…The back-propagation learning algorithm is used as learning model. The environment load factors, workmanship, design, usage and level of maintenance are used as input variables in training process of the neural network model. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
12
Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.]
Published 2021“…To overcome the issues, datasets of reinforced concrete damage images are intelligently trained and classified by selected Machine Learning algorithms such as Naïve- Bayesian, Discriminant Analysis, K-Nearest Neighbor, and Support Vector Machine. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems
Published 2019“…The improved algorithm is based on hybridization of quasi opposition-based learning in enhanced scatter search (QOBLESS) method. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Stock price monitoring system
Published 2024“…As stock price is time series data, a time series prediction algorithm is being utilized to build a deep learning model, namely Long Short-Term Memory (LSTM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Modeling total quality management in higher education with case-based reasoning
Published 2023“…This paper emphasizes on the mastery learning approach, which is in line with TQM. The learning process contains the following steps: Plan, teach (Do), Check (formative evaluation), revised teaching (Act), and Test (summative evaluation). …”
Article -
17
An Improved Scatter Search Algorithm for Parameter Estimation in Large-Scale Kinetic Models of Biochemical Systems
Published 2019“…The improved algorithm is based on hybridization of quasi oppositionbased learning in enhanced scatter search (QOBLESS) method. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…So it very well may be done consequently by utilizing image processing. Deep learning algorithms have been used for the solution of multiple issues in the area of image classification. …”
Get full text
Get full text
Article -
19
-
20
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
thesis::doctoral thesis
