Search Results - (( java implementation path algorithm ) OR ( knowledge using cross algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- knowledge using »
- cross algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…The Multimodal Transformer Fusion (MMTF) model uses the cross-modal attention mechanisms to combine these streams of data to produce unified emotional representations. …”
Get full text
Get full text
Article -
6
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
Get full text
Get full text
Thesis -
7
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
8
Association Rule Mining Using Market Basket Analysis
Published 2003“…This is because that knowledge discovery is very important to extract the useful knowledge in order to improve marketing strategy. …”
Get full text
Get full text
Get full text
Thesis -
9
Simulation model algorithm for pre-hospital emergency care (PHEC) volunteers in Indonesia
Published 2018“…This study applied quasi-experimental design with static group comparison pattern using cross-sectional approach. A number of 40 samples of common people consisting of 20 samples in treatment group and 20 samples in control group were taken. …”
Get full text
Get full text
Get full text
Article -
10
Cross cultural competence, human resource management practices, cross cultural adjustment and adaptive performance among Jordanian military leaders in United Nations peacekeeping
Published 2014“…The Partial Least Squares Method (PLS) algorithm and the bootstrap techniques were used to test the hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
11
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
Get full text
Get full text
Article -
12
Evaluating endpoint detection algorithms for isolated word from Malay parliamentary speech
Published 2023Conference paper -
13
Comparison Performance of Qualitative Bankruptcy Classification based on Data Mining Algorithms
Published 2018“…Bankruptcy classification and prediction are imperative for informed decision making and problem-solving in actual risk assessment. Knowledge discovery using data mining techniques are commonly applied in bankruptcy classification and prediction. …”
Get full text
Get full text
Get full text
Article -
14
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…Therefore, from this experiment, we can conclude that CluFA hadimproved the gene function prediction through the utilization of GO and gene expression values using the fuzzy c -meansclustering algorithm by cross referencing it with the latest SGD annotation.…”
Get full text
Get full text
Article -
15
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021“…This paper provides an empirical study report, that building price predictions are based on green building and other general determinants. This experiment used five common machine learning algorithms namely 1) Linear Regressor, 2) Decision Tree Regressor, 3) Random Forest Regressor, 4) Ridge Regressor and 5) Lasso Regressor tested on a real estate data-set of covering Kuala Lumpur District, Malaysia. 3 set of experiments was conducted based on the different feature selections and purposes The results show that the implementation of 16 variables based on Experiment 2 has given a promising effect on the model compare the other experiment, and the Random Forest Regressor by using the Split approach for training and validating data-set outperformed other algorithms compared to Cross-Validation approach. …”
Get full text
Get full text
Conference or Workshop Item -
16
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
17
A Predictive Classification Model For Running Injury
Published 2022“…Data mining approach was conducted to pre-process and to classify data into three injury levels: low, moderate, and severe risks aided by Waikato Environment for Knowledge Analysis (WEKA) version 3.8.6 tool. The J48, SMO, Random Forest, and Simple Logistic algorithms were used for 10-fold cross validation mode classification benchmarked on the ZeroR baseline algorithm. …”
Get full text
Get full text
Monograph -
18
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Adding the uncertain class the best accuracy obtained was 98.5% using the SMO algorithm. A predictive classification model that determines the accuracy for three classification classes was developed accordingly using the SMO algorithm.…”
Get full text
Get full text
Monograph -
19
Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization
Published 2022“…The ANN model is further improved using GA and PSO. Each algorithm has its own parameters and is further optimized using RSM. …”
Get full text
Get full text
Thesis -
20
An Automated System For Classifying Conference Papers
Published 2021“…A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
