Search Results - (( java implementation path algorithm ) OR ( knowledge among pattern algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- knowledge among »
- path algorithm »
- among pattern »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset
Published 2018“…This paper proposes IF-Postdiffset as a new variant in R-Eclat algorithm. This paper also highlights the performance of infrequent mining pattern from the transaction database among different variants of the R-Eclat algorithm regarding its execution time.…”
Get full text
Get full text
Article -
6
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…An algorithm called Flex (Frequent lexicographic patterns) has been proposed in obtaining a good performance of searching li-equent patterns. …”
Get full text
Get full text
Thesis -
7
Analysis of K-Mean and X-Mean Clustering Algorithms Using Ontology-Based Dataset Filtering
Published 2021“…In the field of computer science, data mining facilitates the extraction of useful knowledge and patterns from a huge amount of data. …”
Get full text
Get full text
Get full text
Article -
8
Evaluation of fall detection classification approaches
Published 2012“…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
Get full text
Get full text
Conference or Workshop Item -
9
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…The knowledge that was inadequate among the respondents were knowledge on primary and secondary transmission of dengue fever, knowledge on possible breeding sites of dengue vectors and knowledge on the severity of dengue fever and vectors. …”
Get full text
Get full text
Thesis -
10
-
11
An efficient fuzzy C-least median clustering algorithm
Published 2021“…The outcomes demonstrate a clear improvement of our algorithm than existing FCM algorithm.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
13
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…Neuro-fuzzy systems are globally employed for pattern recognition, industrial plant control, system predictions, modeling and other decision making purposes. …”
Get full text
Get full text
Thesis -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
-
16
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Herb recognition for mobile apps / Jumriyanie Baba
Published 2017“…The mobile application is able to recognize the herbs type using the most suitable algorithm. In addition, this mobile application will also provide the information about the herbs for user's knowledge.…”
Get full text
Get full text
Thesis -
18
A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan
Published 2024“…This research also aims to present a reliable autonomous algorithm that minimizes the issues with localization and navigation skills among autistic people in a HBVE to improve their wayfinding and spatial knowledge. …”
Get full text
Get full text
Get full text
Thesis -
19
Improving named entity recognition accuracy of gene and protein in biomedical text
Published 2011“…In this study, to handle the above issues in recognizing gene and protein names, a statistical similarity measurement as a pattern matching function is proposed. Our approach is based on an assumption that a named entity occurs among a noun group which is extracted using Brill Part of Speech tagger. …”
Get full text
Get full text
Thesis -
20
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Modelling distinctive characteristics among individuals, especially in a dynamic environment involves incremental knowledge updates from time to time. …”
Get full text
Get full text
Get full text
Get full text
Thesis
