Search Results - (( java implementation path algorithm ) OR ( knowledge detection based algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  6. 6

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  7. 7

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…A blind signal detector, which is known as eigenvalue based detection, was found to be the most desired detector for its detection capabilities, time of execution, and zero a-priori knowledge. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant by Al-Neami, F. B., Al-Kayiem, Hussain H.

    Published 2008
    “…The recent work presents a new method of fault diagnosis based on artificial neural networks and genetic algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Leaf lesion classification (LLC) algorithm based on artificial bee colony (ABC) by Ahmad, Faudziah, Ku-Mahamud, Ku Ruhana, Sainin, Mohd Shamrie, Airuddin, Ahmad

    Published 2015
    “…In this paper, an algorithm to classify leaf disease severity based on lesions is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…Viola-Jones algorithm is utilized for face detection. Upon acquiring the face location, the knowledge-based method is implemented to locate the eye and the mouth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  20. 20

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Conference or Workshop Item