Search Results - (( java implementation path algorithm ) OR ( knowledge among (patterns OR pattern) algorithm ))

Refine Results
  1. 1

    Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset by Julaily Aida, Jusoh, Wan Aezwani, Wan Abu Bakar, Mustafa, Man

    Published 2018
    “…This paper proposes IF-Postdiffset as a new variant in R-Eclat algorithm. This paper also highlights the performance of infrequent mining pattern from the transaction database among different variants of the R-Eclat algorithm regarding its execution time.…”
    Get full text
    Get full text
    Article
  2. 2

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…An algorithm called Flex (Frequent lexicographic patterns) has been proposed in obtaining a good performance of searching li-equent patterns. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Analysis of K-Mean and X-Mean Clustering Algorithms Using Ontology-Based Dataset Filtering by Rahmah, Mokhtar, Raza, Muhammad Ahsan, Fauziah, Zainuddin, Nor Azhar, Ahmad, Raza, Muhammad Fahad, Raza, Binish

    Published 2021
    “…In the field of computer science, data mining facilitates the extraction of useful knowledge and patterns from a huge amount of data. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Evaluation of fall detection classification approaches by Kerdegari, Hamideh, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Ghotoorlar, Saeid Mokaram

    Published 2012
    “…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…Neuro-fuzzy systems are globally employed for pattern recognition, industrial plant control, system predictions, modeling and other decision making purposes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The knowledge that was inadequate among the respondents were knowledge on primary and secondary transmission of dengue fever, knowledge on possible breeding sites of dengue vectors and knowledge on the severity of dengue fever and vectors. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Improving named entity recognition accuracy of gene and protein in biomedical text by Tohidi, Hossein

    Published 2011
    “…In this study, to handle the above issues in recognizing gene and protein names, a statistical similarity measurement as a pattern matching function is proposed. Our approach is based on an assumption that a named entity occurs among a noun group which is extracted using Brill Part of Speech tagger. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Herb recognition for mobile apps / Jumriyanie Baba by Baba, Jumriyanie

    Published 2017
    “…The mobile application is able to recognize the herbs type using the most suitable algorithm. In addition, this mobile application will also provide the information about the herbs for user's knowledge.…”
    Get full text
    Get full text
    Thesis
  19. 19

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…Modelling distinctive characteristics among individuals, especially in a dynamic environment involves incremental knowledge updates from time to time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Stock indicator scanner customization tool by Cheah, Shing Dhee

    Published 2022
    “…This is mainly to combine the power of the machine learning algorithms with the domain knowledge of investors to make more meaningful prediction rather than supply random technical indicators as input of the model like previous work. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis