Search Results - (( java implementation path algorithm ) OR ( knowledge identification process algorithm ))
Search alternatives:
- knowledge identification »
- identification process »
- java implementation »
- implementation path »
- process algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-specific knowledge, which consists of process operation data and the process flow sheet, has been constructed using a HYSIS process simulator. …”
Get full text
Get full text
Article -
6
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…This research presents an efficient way to facilitate the hearing loss symptoms diagnosis process by designing a symptoms identification model that efficiently identify hearing loss symptoms based on air and bone conduction pure-tone audiometry data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
9
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The second component is the search process that is operated by a pattern matching. The third process is the parsing that is operated by a text mining algorithm. …”
Article -
10
Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis -
11
Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis -
12
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
13
-
14
Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin
Published 2005“…Images are used as samples to be processed for the used of classification. In order to have a system which has an ability to learn, back-propagation learning algorithm is used. …”
Get full text
Get full text
Thesis -
15
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Secondly, the feature transformation, a knowledge-based method, is utilized to pre-process the fault data. …”
Get full text
Get full text
Get full text
Article -
16
A framework for malware identification based on behavior
Published 2012“…These three major components are integrated together as a cohesive unit for malware identification through knowledge storage. The experiment on the framework shows that as compared to several other related works, this framework provides better solutions on malware behavior definition, prediction and target classification. …”
Get full text
Get full text
Thesis -
17
-
18
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…However, not much attention has been paid to issues related to skyline query processing over knowledge of large-scale incomplete graph databases. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
Get full text
Get full text
Get full text
Article -
20
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article
