Search Results - (( java implementation path algorithm ) OR ( knowledge using maximization algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
    Get full text
    Get full text
    Article
  6. 6

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evaluation on rapid profiling with clustering algorithms for plantation stocks on Bursa Malaysia by Keng, Hoong Ng, Kok, Chin Khor

    Published 2016
    “…In this study, we utilized Expectation Maximization (EM), K-Means (KM), and Hierarchical Clustering (HC) algorithms to cluster the 38 plantation stocks listed on Bursa Malaysia using 14 financial ratios derived from the fundamental analysis.The clustering allows investors to profile each resulted cluster statistically and assists them in selecting stocks for their stock portfolios rapidly.The performance of each cluster was then assessed using 1-year stock price movement.The result showed that a cluster resulted from EM had a better profile and obtained a higher average capital gain as compared with the other clusters.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Comparison of clustering algorithms on air quality substances in Peninsular Malaysia / Sitti Sufiah Atirah Rosly, Balkiah Moktar and Muhamad Hasbullah Mohd Razali by Rosly, Sitti Sufiah Atirah, Moktar, Balkiah, Mohd Razali, Muhamad Hasbullah

    Published 2017
    “…Monthly data from 37 monitoring stations in Peninsular Malaysia from the year 2013 to 2015 were used in this study. K-Means (KM) clustering algorithm, Expectation Maximization (EM) clustering algorithm and Density Based (DB) clustering algorithm have been chosen as the techniques to analyze the cluster analysis by utilizing the Waikato Environment for Knowledge Analysis (WEKA) tools. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…Based on previous research using one of metaheuristic algorithms known as harmony search (HS), the generated schedule was still not optimum and cannot be solved maximally as there were too much repetitions of task (shift and route) occurred among drivers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems by Mohammed Ahmed, Adeeb Ali

    Published 2020
    “…In conclusion, the proposed low-complexity iterative algorithm can be used to maximize the EE based on the maximum transmit power , where the noise power is less than the power of the received pilot sequence.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Energy-Efficient Low-Complexity Algorithm in 5G Massive MIMO Systems by Salh, Adeeb, Audah, Lukman, Abdullah, Qazwan, M. Shah, Nor Shahida, A. Hamzah, Shipun, Nordin, Shahilah, Farah, Nabil

    Published 2021
    “…Simulation results demonstrate that the maximal EE was achieved using the iterative LCA based on reasonable maximum transmit power, in the case the noise power is less than the received power pilot. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Development of deep reinforcement learning based resource allocation techniques in cloud radio access network by Amjad, Iqbal

    Published 2022
    “…Nextgeneration networks are envisioned to support management to maximize the user s ’ dynamic and agile network quality of service (QoS). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman by Othman, Nor Azairiah Fatimah

    Published 2017
    “…This study made an attempt to incorporate knowledge transfer-related variables (articulability of knowledge, credibility of knowledge source, gap of theory-practice, embedded knowledge and environmental uncertainty) into the framework. …”
    Get full text
    Get full text
    Book Section