Search Results - (( java implementation path algorithm ) OR ( knowledge making modified algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- knowledge making »
- making modified »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…A modified apriori algorithm was employed to reduce the number of clusters effectively on the basis of common data in the clusters of every input to obtain a minimal set of decision rules based on datasets. …”
Get full text
Get full text
Thesis -
6
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…For instance, in case of forex, the online algorithm is presented daily exchange rates. The algorithm does not have knowledge about future exchange rates, and has to make an irreversible conversion decision on each day. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Development of rule-based advisory system from modified hazard and operability study on fatty acid fractionation column
Published 2003“…In order to apply the modified HAZOP study, a rule-based advisory system, which consists of knowledge-based and inference engine has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A novel association rule mining approach using TID intermediate itemset
Published 2018“…However, dynamic decision making that needs to modify the threshold either to minimize or maximize the output knowledge certainly necessitates the extant state-of-the-art algorithms to rescan the entire database. …”
Get full text
Get full text
Article -
10
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
Get full text
Get full text
Get full text
Thesis -
11
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis -
12
A novel association rule mining approach using TID intermediate itemset
Published 2018“…However, dynamic decision making that needs to modify the threshold either to minimize or maximize the output knowledge certainly necessitates the extant state-of-the-art algorithms to rescan the entire database. …”
Get full text
Get full text
Get full text
Article -
13
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Improving GSM Security By Enhancing Randomness Property Of A5/1 Design
Published 2024Get full text
Get full text
Article -
18
Tubular linear switched reluctance actuator: Design and characterization
Published 2022“…This method is straightforward, while no extensive knowledge of power electronic converter is required. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Identification of suitable explanatory variable in goldfeld-quandt test and robust inference under heteroscedasticity and high leverage points
Published 2016“…This study has developed an algorithm of identifying this variable prior to conducting the Goldfeld-Quandt test in multiple linear regression model. …”
Get full text
Get full text
Thesis -
20
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
Get full text
Get full text
Get full text
Thesis
