Search Results - (( java implementation path algorithm ) OR ( knowledge profiling process algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- profiling process »
- process algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Optimisation of fed-batch fermentation process using deep reinforcement learning
Published 2023“…The performance of the proposed algorithm was compared with a pre-determined exponential feeding profile and a genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Selection of prospective workers using profile matching algorithm on crowdsourcing platform
Published 2022“…These criteria become variables that are used in the profile matching algorithm to find workers who best match the profiles offered. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A knowledge based system for automatic classification of web pages
Published 2006“…Each stem word is generated with local profile. This local profile contains information that indicates the weight of each stem with the possible related classes of web pages.A statistical analysis process is illustrated to reduce the noise stems.The various components of the AIRDB are described.The knowledge based system is tested with various web pages that disseminate their content in English.The average discrimination performance of the AIRDB reaches 84%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Attributes of bioinformation can be defined through its primers and profiles. The primers, which entrain processes, both natural and man-induced, include mechanisms such as protocols, algorithms, visualisations, and structural and visual designs. …”
Get full text
Get full text
Inaugural Lecture -
9
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…Hence they need the knowledge of load profile to help them choose their electricity supplier. …”
Get full text
Get full text
Thesis -
10
A hybrid approach to improve recommendation system in E-tourism
Published 2024conference output::conference proceedings::conference paper -
11
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
12
-
13
Ontology based approach to Fuzzy student model design
Published 2014“…ITS is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide a personalized tutoring adaptable to each student based on his/her profile or characteristics. …”
Get full text
Get full text
Article -
14
-
15
Pattern extraction for programming performance evaluation using directed apriori
Published 2009“…Several researches indicated that there are many factors which can affect student programming performance.Thus, the objective of this paper is to investigate the significant factors that may influence students programming performance using information from previous student performance.Since data mining data analysis able to discover hidden knowledge in database, a programming dataset which comprises information about performance profile of Bachelor of Information Technology students of Faculty of IT, Universiti Utara Malaysia in the year 2004-2005 were explored using data mining technique.The dataset consists of 421 records with 70 mixture type of attributes were pre-processed and then mined using directed association rule (AR) mining algorithm namely apriori.The result indicated that the student who has a programming experience in advanced before starts learn programming in university and scored well in Mathematics and English subject during SPM were among the factor that contributes to a good programming grades.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Article -
17
-
18
A hybrid cryptosystem for biometric authentication and template protection
Published 2017“…The proposed key binding scheme known as modified shielding function minimizes the complexity of image processing and addresses the security as well as privacy limitations of generic shielding function. …”
Get full text
Get full text
Thesis -
19
Gravitational energy harvesting system based on multistage braking technique for multilevel elevated car parking building
Published 2020“…Thirdly, modeling of electrical and mechanical parameters for the presented system such that the system performance matching the model, this process is performed by using a parameter optimization algorithm. …”
Get full text
Get full text
Thesis
