Search Results - (( java implementation path algorithm ) OR ( knowledge profiling data algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma by -, Sunardi, -, Abdul Fadlil, Perdana Kusuma, Nur Makkie

    Published 2023
    “…The data collection method in this study uses data mining technology on structured and unstructured data. …”
    Get full text
    Get full text
    Article
  8. 8

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Evaluation on rapid profiling with clustering algorithms for plantation stocks on Bursa Malaysia by Keng, Hoong Ng, Kok, Chin Khor

    Published 2016
    “…Building a stock portfolio often requires extensive financial knowledge and Herculean efforts looking at the amount of financial data to analyse. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain by Mohd Hussain, Mashitah

    Published 2014
    “…The voltage profile is predicted using Independent Component Analysis (lCA) algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar by Anuar, Norhasnelly

    Published 2015
    “…Hence they need the knowledge of load profile to help them choose their electricity supplier. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A knowledge based system for automatic classification of web pages by Fathy, Sherif Kassem

    Published 2006
    “…Each stem word is generated with local profile. This local profile contains information that indicates the weight of each stem with the possible related classes of web pages.A statistical analysis process is illustrated to reduce the noise stems.The various components of the AIRDB are described.The knowledge based system is tested with various web pages that disseminate their content in English.The average discrimination performance of the AIRDB reaches 84%.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A hybrid approach to improve recommendation system in E-tourism by Rahman M.M., Zaki Z.B.M., Alwi N.H.B.M., Monirul Islam M.

    Published 2024
    conference output::conference proceedings::conference paper
  14. 14

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Pattern extraction for programming performance evaluation using directed apriori by Mohamad Mohsin, Mohamad Farhan, Zaiyadi, Mohd Fairuz, Md Norwawi, Norita, Abd Wahab, Mohd Helmy

    Published 2009
    “…Several researches indicated that there are many factors which can affect student programming performance.Thus, the objective of this paper is to investigate the significant factors that may influence students programming performance using information from previous student performance.Since data mining data analysis able to discover hidden knowledge in database, a programming dataset which comprises information about performance profile of Bachelor of Information Technology students of Faculty of IT, Universiti Utara Malaysia in the year 2004-2005 were explored using data mining technique.The dataset consists of 421 records with 70 mixture type of attributes were pre-processed and then mined using directed association rule (AR) mining algorithm namely apriori.The result indicated that the student who has a programming experience in advanced before starts learn programming in university and scored well in Mathematics and English subject during SPM were among the factor that contributes to a good programming grades.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An investigation into influence factor of student programming grade using association rule mining by Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Zaiyadi, Mohd Fairuz, Hibadullah, Cik Fazilah

    Published 2010
    “…Researches indicated there are many factors can affect student programming performance.Thus, the aim of this study is to investigate the significant factors that may influence students programming performance based information from previous student performance using data mining technique. Data mining is a data analysis technique that able to discover hidden knowledge in database. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A hybrid cryptosystem for biometric authentication and template protection by Jegede, Abayomi Joshua

    Published 2017
    “…However, the biometric modalities used are not secret as biometric data can be obtained without the knowledge, permission or cooperation of the owner, thus violating the security of the authentication system and the privacy of legitimate users. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd... by Sharifah Nabilah , Syed Mohd Hamdan

    Published 2024
    “…Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
    Get full text
    Get full text
    Get full text
    Thesis