Search Results - (( java implementation path algorithm ) OR ( knowledge level pattern algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- level pattern »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Knowledge Discovery Of Noise Level In Lecture Rooms
Published 2018“…The classroom acoustics is an important aspect of the lecturing and learning condition in university level to ensure the student able to receive the information and knowledge from the lecturer. …”
Get full text
Get full text
Monograph -
6
Study on the influence of knowledge-driven technology on predicting consumer repurchase behaviour
Published 2023“…In this prospect, many MNCs and other enterprises harness contemporary computing technologies like Big Data Analytics, Deep Learning and Predictive Analytics to explore the latent knowledge in purchase patterns and customer behaviour. …”
Get full text
Get full text
Article -
7
An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing
Published 2014“…The images obtained from MIVIA dataset has been manually segmented to cell level from the image level. Developing an automated segmentation algorithm might give better results.…”
Get full text
Get full text
Final Year Project -
8
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…By applying this algorithm, the study achieves a high level of precision in predicting various types of detrimental behavior, enabling a better understanding of their underlying patterns. …”
Get full text
Get full text
Get full text
Article -
9
Classification Analysis Of The Badminton Five Directional Lunges
Published 2018“…There are no works conducted to mine the patterns of directional badminton lunge motions. Therefore, this study attempted to (i) study the patterns of lunge motion in the badminton game, (ii) classify badminton players’ postures by lunge type and (iii) compare the differences in the badminton lunge patterns between university and national level players. …”
Get full text
Get full text
Monograph -
10
Smart waste management system with IoT monitoring
Published 2023Get full text
Get full text
Get full text
Article -
11
Employability prediction based on personality test using Naive Bayes Algorithm / Mohd Alief Mukhlis Mohd Adnin
Published 2020“…However, employability is not only determined by the knowledge, skills, and abilities an individual possesses, but also requires other latent, higher-order personality trait that facilitates an individual's ability to adapt to changing work environment and career patterns (Fugate et al., 2004). …”
Get full text
Get full text
Thesis -
12
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
13
IoT based drainage monitoring system
Published 2023Get full text
Get full text
Get full text
Article -
14
A preliminary framework of measuring music attractiveness based on facial beauty theory
Published 2016“…In past, only those with certain level of musical knowledge were able to compose music as it is very time consuming to learn and practice musical instruments. …”
Get full text
Get full text
Conference or Workshop Item -
15
Determining malaria risk factors in Abuja, Nigeria using various statistical approaches
Published 2018“…Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
Get full text
Get full text
Thesis -
16
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
17
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…Computational thinking and computer science (CTCS) is an educational approach that involves a four-stage process involving concepts of decomposition, pattern recognition, abstraction, and algorithm that promotes greater levels of thinking. …”
Get full text
Get full text
Get full text
Proceeding -
18
-
19
Transitioning from information sharing to knowledge services: unpacking the evolution of rural media within the context of media integration
Published 2023“…By bridging the urban–rural digital divide, this study contributes to a more equitable media landscape in China and underscores the platform’s role in reshaping the dynamics of knowledge dissemination and entertainment consumption in the knowledge-based economy of the twenty-first century.…”
Get full text
Get full text
Get full text
Article -
20
Improving named entity recognition accuracy of gene and protein in biomedical text
Published 2011“…This complexity includes the issues of character-level variation, word-level variation, and word order variation in biomedical text literature. …”
Get full text
Get full text
Thesis
