Search Results - (( java implementation path algorithm ) OR ( knowledge being function algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- function algorithm »
- knowledge being »
- path algorithm »
- being function »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019“…This proposed algorithm could support to improve the overall health of CKD patients through a variety of indicators such as physical functioning, mental health, vitality, and social functioning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients
Published 2019“…A case study of the CKD patients with the selected indicators is considered to demonstrate the capability of z-numbers to handle the knowledge of human being and uncertain information and also will present the idea in developing a robust and reliable fuzzy clustering algorithm particularly in dealing with knowledge of human being using z-numbers.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
DEVELOPMENT OF A MULTI-OBJECTIVE OPTIMZATION FRAMEWORK FOR INDUSTRIAL PROCESSES
Published 2014“…The proposed framework is introduced as the 'surgery framework (SF)' since its prime functionality is to dissect the algorithm and add certain mechanisms into it. …”
Get full text
Get full text
Thesis -
8
Assessing the outcome of Competencies Level from Knowledge-Based Project
Published 2008“…Each student will also being recommended according totheir performances by our recommendation function. …”
Get full text
Get full text
Final Year Project -
9
Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA)
Published 2013“…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A Mobile Application For Stock Price Prediction
Published 2021“…There are a few prediction algorithms being evaluated which were Long Short-Term Memory (LSTM), Holt Winter, AutoRegression Integrated Moving Average (ARIMA), Seasonal Auto-Regression Integrated Moving Average (SARIMA) and Prophet. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Multiple case-based retrieval for university course timetabling problem
Published 2016“…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. The algorithm is combining separated distinct processes, with the combination of different functionalities: Prioritized Attributes, Frequency Grouping, and Value Difference Measurement. …”
Get full text
Get full text
Thesis -
12
What, how and when to use knowledge in neural network application
Published 2004“…; How to use this knowledge?; and When to use this knowledge? Knowledge is simply the weights that connect each neuron in neural networks. …”
Get full text
Get full text
Conference or Workshop Item -
13
FBGs Real-Time Impact Damage Monitoring System of GFRP Beam Based on CC-LSL Algorithm
Published 2018“…Thus, in this paper, an in situ FBG sensor was embedded in a GFRP beam, providing an online real-time monitoring system and with the knowledge of cross-correlation linear source location (CC-LSL) algorithm, the impact location was capable of being determined in a split second. …”
Get full text
Get full text
Article -
14
Predicting the popularity of tweets using the theory of point processes.
Published 2019“…The knowledge is combined using a novel empirical Bayes type approach, where the prior distribution for the model parameter is constructed based on the external knowledge, and the likelihood is calculated based on the internal knowledge. …”
Get full text
Get full text
UMK Etheses -
15
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
16
FBGs Real-Time Impact Damage Monitoring System of GFRP Beam Based on CC-LSL Algorithm
Published 2018“…Thus, in this paper, an in situ FBG sensor was embedded in a GFRP beam, providing an online real-time monitoring system and with the knowledge of cross-correlation linear source location (CC-LSL) algorithm, the impact location was capable of being determined in a split second. …”
Get full text
Get full text
Get full text
Article -
17
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…The rest sets of experiments carried out to evaluate the proposed algorithms. Precisely, the second set revealed that the proposed genetic medoid based algorithms with both DB and VRC fitness functions produced more accurate results compared with the genetic means based algorithms in terms of the Fscore. …”
Get full text
Get full text
Thesis -
18
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section -
19
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section -
20
An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing
Published 2014“…Another downside is test results being subject to change with experts knowledge and years of experience. …”
Get full text
Get full text
Final Year Project
