Search Results - (( java implementation path algorithm ) OR ( knowledge requirement pattern algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…A large pool of data requires not only an efficient and effective retrieval system but also a better way to discover hidden knowledge. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall by Mustafa, M.R., Rezaur, R.B., Saiedi, Saied, Rahardjo, H., Isa, M.H.

    Published 2013
    “…The LM training algorithm is therefore proposed as an ideal and fast training algorithm for modeling the dynamics of soil pore-water pressure changes in response to rainfall patterns.…”
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    A Scalable Algorithm for Constructing Frequent Pattern Tree by Noraziah, Ahmad, Herawan, Tutut, Zailani, Abdullah, Mustafa, Mat Deris

    Published 2014
    “…In typical FP-Tree construction, besides the prior knowledge on support threshold, it also requires two database scans; first to build and sort the frequent patterns and second to build its prefix paths. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    DSC766: Text Analytics / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2020
    “…However, a number of statistical approaches have been shown to work well for the "shallow" but robust analysis of text data for pattern finding and knowledge discovery. Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  11. 11
  12. 12

    Big data clustering using grid computing and ant-based algorithm by Ku-Mahamud, Ku Ruhana

    Published 2013
    “…However, there are many challenges in dealing with big data such as storage, transfer, management and manipulation of big data.Many techniques are required to explore the hidden pattern inside the big data which have limitations in terms of hardware and software implementation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Machine Learning Applications in Offense Type and Incidence Prediction by Balaji, R., Manjula Sanjay, Koti, Harprith, Kaur

    Published 2024
    “…We can develop targeted strategies to prevent and respond to such incidents by analyzing these patterns. Artificial Intelligence (AI) techniques encompass variouscomputational methods and algorithms designed to enable machines to perform tasks that typically require human intelligence. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Multilevel learning in Kohonen SOM network for classification problems by Mohd. Yusof, Norfadzila

    Published 2006
    “…Unlike classical statistical methods, SOM does not require any preventive knowledge about the statistical distribution of the patterns in the environment. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Even though, there is a tool for clustering, some of this tool required an expert knowledge in clustering in order to understand the results. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Classifying Indian Classical Dances By Motion Posture Patterns by Khor, Chong Hwa

    Published 2019
    “…Data mining analysis was performed in three stages: data pre�processing, data classification and knowledge discovery using the WEKA software. RandomForest algorithm returned the highest classification accuracy (99.2616%). …”
    Get full text
    Get full text
    Monograph
  18. 18

    Simulation model algorithm for pre-hospital emergency care (PHEC) volunteers in Indonesia by Martono, Martono, Sudiro, Sudiro, Satino, Satino

    Published 2018
    “…Algorithm models for PHEC simulation have some strengths in real setting and effective interactive learning to evaluate the capabilities of first responders in managing pre-hospital emergency, and improve problem-solving skills, as well as their performance in such aspects as skill, knowledge, and attitude.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Employability prediction based on personality test using Naive Bayes Algorithm / Mohd Alief Mukhlis Mohd Adnin by Mohd Adnin, Mohd Alief Mukhlis

    Published 2020
    “…However, employability is not only determined by the knowledge, skills, and abilities an individual possesses, but also requires other latent, higher-order personality trait that facilitates an individual's ability to adapt to changing work environment and career patterns (Fugate et al., 2004). …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Clustering Algorithm for Evolving Data Streams Using Temporal Spatial Hyper Cube by Al?amri R., Murugesan R.K., Almutairi M., Munir K., Alkawsi G., Baashar Y.

    Published 2023
    “…As applications generate massive amounts of data streams, the requirement for ways to analyze and cluster this data has become a critical field of research for knowledge discovery. …”
    Article