Search Results - (( java implementation path algorithm ) OR ( filing rules using algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- using algorithm »
- path algorithm »
- filing rules »
- rules using »
-
1
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…Other than that, affixes rule format in file "rule.txt" are added and misspell words are corrected. …”
Get full text
Get full text
Thesis -
2
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
3
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…In second experiment, affixes rule are added in rule format in file "rule.txt". …”
Get full text
Get full text
Thesis -
4
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
5
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Therefore, this project intended to provide a better platform for local neighbourhood to file their complaint and the local council to address the filed complaint. …”
Get full text
Get full text
Get full text
Book Section -
7
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
8
Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus
Published 2000“…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
Get full text
Get full text
Thesis -
9
Enhancement of rules-application-order (RAO) stemming algorithm based on the first character of Malay word / Edatul Muliana Ghazalli
Published 2005“…Stemming is important thing to improve retrieval effectiveness. Stemming is used to reduce the size of indexing file for relevancy of document retrieval. …”
Get full text
Get full text
Thesis -
10
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
11
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
FURIA stacking ensemble for ASD classification
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
13
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…Other than that we modify the total value for 'a', 'k' and 'm'dictionary in header file "dcvarnew.h". Third, the modification into the program is adding the affixes rule format in "rule.txt" Forth, add a new code to differentiate the use of affix rule of "di+an" and "di+kan". …”
Get full text
Get full text
Thesis -
14
-
15
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
16
Using Markov Model and Association Rules for Web Access Prediction
Published 2006“…Mining user patterns of log file can provide significant and useful informative knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
17
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Predicting next page access by Markov models and association rules on web log data
Published 2006“…Mining user patterns of log file can provide significant and useful informative knowledge. …”
Get full text
Get full text
Get full text
Article -
20
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Using a novel firewall framework designed in this dissertation, an algorithm adapted from research by Yan, Wu, Luo, & Zhang (2013) was used for the P2P identification method. …”
Get full text
Get full text
Thesis
