Search Results - (( java implementation path algorithm ) OR ( knowledge level using algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  8. 8

    E4ML: Educational Tool for Machine Learning by Sainin, Mohd Shamrie, Siraj, Fadzilah

    Published 2003
    “…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    The Security Level Of Two Xored-based A5 Crypto System by Nur Hafiza Zakaria, Kamaruzzaman Seman, Ismail Abdullah

    Published 2024
    “…Five (5) statistical tests were used to test the strength of the algorithm. Both of the proposed modified XORed-based A5/1 algorithms successfully passed the five (5) statistical tests.…”
    Article
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14
  15. 15
  16. 16
  17. 17

    Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham by Amir Sham, Norfarhana Syamiza

    Published 2017
    “…The examination questions will measure the understanding and knowledge level of students. However, there are differences in background among computer science diploma level students. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper by Ahmed, Hesham, As’arry, Azizan, Hairuddin, Abdul Aziz, Hassan, Mohd Khair, Liu, Yunyun, Onwudinjo, Erasmus Cufe Ujunwa

    Published 2022
    “…However, in the Fuzzy-PID controller, the fuzzy logic algorithm is used to auto-tune the PID controller, but it cannot be considered as a fully real-time controller since the fuzzy algorithm uses a previous knowledge base built offline. …”
    Get full text
    Get full text
    Article
  19. 19

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…AI in KMS is used in the knowledge creation process. The Bert2Bert model is used in the multi-document summarisation of Indonesian-language knowledge in the knowledge combination process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Knowledge Discovery Of Noise Level In Lecture Rooms by Tang, Jau Hoong

    Published 2018
    “…The classroom acoustics is an important aspect of the lecturing and learning condition in university level to ensure the student able to receive the information and knowledge from the lecturer. …”
    Get full text
    Get full text
    Monograph