Search Results - (( java implementation path algorithm ) OR ( knowledge being function algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Reliability fuzzy clustering algorithm for wellness of elderly people by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…This proposed algorithm could support to improve the overall health of CKD patients through a variety of indicators such as physical functioning, mental health, vitality, and social functioning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…A case study of the CKD patients with the selected indicators is considered to demonstrate the capability of z-numbers to handle the knowledge of human being and uncertain information and also will present the idea in developing a robust and reliable fuzzy clustering algorithm particularly in dealing with knowledge of human being using z-numbers.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    DEVELOPMENT OF A MULTI-OBJECTIVE OPTIMZATION FRAMEWORK FOR INDUSTRIAL PROCESSES by GANESAN, TIMOTHY

    Published 2014
    “…The proposed framework is introduced as the 'surgery framework (SF)' since its prime functionality is to dissect the algorithm and add certain mechanisms into it. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Assessing the outcome of Competencies Level from Knowledge-Based Project by Sungsinlert, Anyamanee

    Published 2008
    “…Each student will also being recommended according totheir performances by our recommendation function. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA) by Othman, Mahmod, Ku-Mahamud, Ku Ruhana, Hawani, Shezrin, Hamzah, Amir, Khalid, Shaiful Annuar, Abdullah, Fader

    Published 2013
    “…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…There are a few prediction algorithms being evaluated which were Long Short-Term Memory (LSTM), Holt Winter, AutoRegression Integrated Moving Average (ARIMA), Seasonal Auto-Regression Integrated Moving Average (SARIMA) and Prophet. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Multiple case-based retrieval for university course timetabling problem by Hong, Siaw Theng

    Published 2016
    “…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. The algorithm is combining separated distinct processes, with the combination of different functionalities: Prioritized Attributes, Frequency Grouping, and Value Difference Measurement. …”
    Get full text
    Get full text
    Thesis
  12. 12

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…; How to use this knowledge?; and When to use this knowledge? Knowledge is simply the weights that connect each neuron in neural networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    FBGs Real-Time Impact Damage Monitoring System of GFRP Beam Based on CC-LSL Algorithm by Vorathin, E., Zohari, Mohd Hafizi, Ghani, S.A. Che, Siregar, Januar Parlaungan, Lim, Kok Sing

    Published 2018
    “…Thus, in this paper, an in situ FBG sensor was embedded in a GFRP beam, providing an online real-time monitoring system and with the knowledge of cross-correlation linear source location (CC-LSL) algorithm, the impact location was capable of being determined in a split second. …”
    Get full text
    Get full text
    Article
  14. 14

    Predicting the popularity of tweets using the theory of point processes. by Tan, Wai Hong

    Published 2019
    “…The knowledge is combined using a novel empirical Bayes type approach, where the prior distribution for the model parameter is constructed based on the external knowledge, and the likelihood is calculated based on the internal knowledge. …”
    Get full text
    Get full text
    UMK Etheses
  15. 15

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  16. 16

    FBGs Real-Time Impact Damage Monitoring System of GFRP Beam Based on CC-LSL Algorithm by Vorathin, E., Mohd Hafizi, Zohari, S. A., Che Ghani, Siregar, J. P., K. S., Lim

    Published 2018
    “…Thus, in this paper, an in situ FBG sensor was embedded in a GFRP beam, providing an online real-time monitoring system and with the knowledge of cross-correlation linear source location (CC-LSL) algorithm, the impact location was capable of being determined in a split second. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…The rest sets of experiments carried out to evaluate the proposed algorithms. Precisely, the second set revealed that the proposed genetic medoid based algorithms with both DB and VRC fitness functions produced more accurate results compared with the genetic means based algorithms in terms of the Fscore. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section
  19. 19

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Another downside is test results being subject to change with experts knowledge and years of experience. …”
    Get full text
    Get full text
    Final Year Project