Search Results - (( java implementation path algorithm ) OR ( knowledge data connection algorithm ))
Search alternatives:
- connection algorithm »
- java implementation »
- implementation path »
- data connection »
- path algorithm »
- knowledge data »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm
Published 2012“…We use frequent pattern growth (FP-Growth) algorithm in the data processing step to build the FP-tree data structure and mine it for frequents itemsets. …”
Get full text
Get full text
Conference or Workshop Item -
6
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
7
What, how and when to use knowledge in neural network application
Published 2004“…; and When to use this knowledge? Knowledge is simply the weights that connect each neuron in neural networks. …”
Get full text
Get full text
Conference or Workshop Item -
8
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
9
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Thus, data stream clustering is crucial for extracting hidden knowledge and data mining. …”
Article -
10
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…Data stream clustering plays an important role in data stream mining for knowledge extraction. …”
Get full text
Get full text
Thesis -
11
Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.]
Published 2023“…The study used empirical research methods: written work, questionnaires, conversations with teachers and future teachers. Data analysis revealed that 87% of students and 80% of teachers lacked knowledge and skills to create mathematical models and establish interdisciplinary connections. …”
Get full text
Get full text
Get full text
Article -
12
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…However, critical reviews have identified that the existing approaches are inefficient in processing data to detect anomalies due to the amassment of massive volumes of data through the connected devices. …”
Get full text
Get full text
Get full text
Thesis -
13
Conclusion
Published 2019“…The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. …”
Get full text
Get full text
Get full text
Book Chapter -
14
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
Get full text
Get full text
Thesis -
15
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
16
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…The result expects its well performance in SI task in the future. A connected words ASR is developed and evaluated on Malay connected digit task and has achieved reasonably good accuracy with limited training data. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
19
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…Vehicular data routing faces many challenges caused by vehicle dynamicity, intermittent connectivity, and diverse application requirements. …”
Get full text
Get full text
Get full text
Article -
20
Knowledge of extraction from trained neural network by using decision tree
Published 2017“…Inside the sets of data, hidden knowledge can be acquired by using neural network. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
