Search Results - (( java implementation path algorithm ) OR ( knowledge usage data algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- knowledge usage »
- path algorithm »
- data algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
Get full text
Get full text
Article -
6
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…With the abundant of knowledge accessible via Internet and the likes, many have ventured into using that knowledge in order to understand deeply on how the available knowledge affected the whole world directly or indirectly. …”
Get full text
Get full text
Thesis -
7
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…In a world of connectivity empowered by the advancement of the Internet of Things (IoT), an infinite number of data streams have emerged. Thus, data stream clustering is crucial for extracting hidden knowledge and data mining. …”
Article -
8
Web usage mining: A review of recent works
Published 2015“…Web mining is the application of data mining on web data and web usage mining is an important component of web mining. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A new classification model for online predicting users' future movements
Published 2008“…We can exploit Web Usage Mining for Knowledge extracting based on user behavior during the web navigation. …”
Get full text
Get full text
Conference or Workshop Item -
10
Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase
Published 2004“…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
BVAGQ-AR for Fragmented Database Replication Management
Published 2021“…Although we have been packed with data, we still have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
Get full text
Get full text
Get full text
Article -
13
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015“…However, in recent years, with widely available, low-cost technology, the amount of various data grows rapidly. The problem is although we are packed with data, but we have lacked of knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
14
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…More recently, cyber-attacks have also been on the rise and SQL injection attacks are some of major threats to data security. AI and machine learning have come a long way, however their usage in cybersecurity is still somewhat nascent. …”
Get full text
Get full text
Get full text
Article -
15
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Thus, resulting in the efficiency of the novel AR-IoT remote monitoring algorithm. This research contributes to existing knowledge of AR-IoT onto the growing area of research scopes by exploring more usage of AR and IoT for remote manufacturing monitoring.…”
Get full text
Get full text
Thesis -
16
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…Analysis of simultaneous clustering of gene expression with biological knowledge has now become an importanttechnique and standard practice to present a proper interpretation of the data and its underlying biology. …”
Get full text
Get full text
Article -
17
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
18
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…By defining the data, machines (or computers) will be able to create information and later on transform it into knowledge. …”
Get full text
Get full text
Thesis -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
20
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…Recently, many researchers have focused on data stream processing as an efficient method for extracting knowledge from big data. …”
Get full text
Get full text
Article
