Search Results - (( java implementation path algorithm ) OR ( knowledge a implication algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…A trade-off algorithm among decision-maker preference is needed for negotiation process. …”
    Get full text
    Get full text
    Article
  7. 7

    Datasets Size: Effect on Clustering Results by Raheem, Ajiboye Adeleke, Ruzaini, Abdullah Arshah, Hongwu, Qin

    Published 2013
    “…The recent advancement in the way we capture and store data pose a serious challenge for data analysis. This gives a wider acceptance to data mining, being an interdisciplinary field that implements algorithm on stored data with a view to discovering hidden knowledge. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid by Mohd Zaid, Aishah Nabila

    Published 2024
    “…This project aims to study the CNN algorithm's efficacy in rabbit breed classification, develop a CNN-based prototype, and evaluate its accuracy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…A computational study shows that improved solutions can be obtained by implementing a genetic algorithm with an extended diversity control mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust by Meddour, Houcine

    Published 2016
    “…These results offer theoretical, methodological, and practical implications and will help academics and practitioners in the knowledge management field. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…The top 10 sources of root growth algorithm research contributed over a quarter of the total articles (231 or 27.60%). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Organizational Culture Automated Audit System (OCAAS) by Al - Jubair, Md. Abdullah

    Published 2017
    “…An organizational culture audit (OCA) is a complete investigation and assessment of an organization’s culture. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Practical implications – The research findings may be found beneficial to policy makers and academics, particularly in understanding trust of social responsibility, its influence on performance of small-scale industries and fit between organizational culture and strategic direction of a business enterprise. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A tool for addressing construct identity in literature reviews and meta-analyses by Larsen, Kai Rune T., Bong, Chih How

    Published 2016
    “…All six designs were found capable of detecting construct identity, and a design combining two existing algorithms significantly outperformed the other approaches. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
    Get full text
    Get full text
    Article
  18. 18

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Existing risk matrices are designed based on brainstorming sessions, which may make these matrices risky to use because such sessions are based mainly on experience and knowledge about the decision at hand. The general objective of this study is to carry out a Risk Assessment for Safety and Health (RASH) algorithm for building construction in Oman and to develop a calculation methodology to evaluate safety and health. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control by Eshtawie, Mohamed Al-Mahdi

    Published 1999
    “…The navigation algorithm is proposed for static obstacles and with no priori knowledge about the environment. …”
    Get full text
    Get full text
    Thesis