Search Results - (( java implementation path algorithm ) OR ( knowledge level data algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- data algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
6
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
Get full text
Get full text
Thesis -
7
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Get full text
Article -
8
Knowledge Discovery Of Noise Level In Lecture Rooms
Published 2018“…The classroom acoustics is an important aspect of the lecturing and learning condition in university level to ensure the student able to receive the information and knowledge from the lecturer. …”
Get full text
Get full text
Monograph -
9
Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar
Published 2016“…This unsupervised learning usually leads to undirected knowledge discovery. The cluster detection algorithm searches for clusters of data which are similar to one another by using similarity measures. …”
Get full text
Get full text
Thesis -
10
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Data mining analysis takes place in four stages: data pre-processing, data classification, classification of attributes by stages of CKD, and classification model verification using Microsoft Excel and Waikato Environmental for Knowledge Analysis (WEKA) version 3.8.5 software. …”
Get full text
Get full text
Monograph -
11
E4ML: Educational Tool for Machine Learning
Published 2003“…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
12
Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham
Published 2017“…The examination questions will measure the understanding and knowledge level of students. However, there are differences in background among computer science diploma level students. …”
Get full text
Get full text
Thesis -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…This voluminous data can lead to ineffectiveness of identifying cyberattack attribution level due to a lack of useful data from various data sources. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Conference or Workshop Item -
17
Rough sets for predicting the Kuala Lumpur Stock Exchange Composite Index returns
Published 2004“…There are extensive literatures available describing attempts to use artificial intelligence techniques; in particular neural networks and genetic algorithm for analyzing stock market variations.However, drawbacks are found where neural networks have great complexity in interpreting the results; genetic algorithms create large data redundancies.A relatively new approach, the rough sets are suggested for its simple knowledge representation, ability to deal with uncertainties and lowering data redundancies.In this study, a few different discretization algorithms were used at data preprocessing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Datasets Size: Effect on Clustering Results
Published 2013“…This gives a wider acceptance to data mining, being an interdisciplinary field that implements algorithm on stored data with a view to discovering hidden knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
