Search Results - (( java implementation path algorithm ) OR ( knowledge using maximization algorithm ))
Search alternatives:
- maximization algorithm »
- java implementation »
- implementation path »
- using maximization »
- knowledge using »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
Get full text
Get full text
Article -
6
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
7
Evaluation on rapid profiling with clustering algorithms for plantation stocks on Bursa Malaysia
Published 2016“…In this study, we utilized Expectation Maximization (EM), K-Means (KM), and Hierarchical Clustering (HC) algorithms to cluster the 38 plantation stocks listed on Bursa Malaysia using 14 financial ratios derived from the fundamental analysis.The clustering allows investors to profile each resulted cluster statistically and assists them in selecting stocks for their stock portfolios rapidly.The performance of each cluster was then assessed using 1-year stock price movement.The result showed that a cluster resulted from EM had a better profile and obtained a higher average capital gain as compared with the other clusters.…”
Get full text
Get full text
Get full text
Article -
8
-
9
Comparison of clustering algorithms on air quality substances in Peninsular Malaysia / Sitti Sufiah Atirah Rosly, Balkiah Moktar and Muhamad Hasbullah Mohd Razali
Published 2017“…Monthly data from 37 monitoring stations in Peninsular Malaysia from the year 2013 to 2015 were used in this study. K-Means (KM) clustering algorithm, Expectation Maximization (EM) clustering algorithm and Density Based (DB) clustering algorithm have been chosen as the techniques to analyze the cluster analysis by utilizing the Waikato Environment for Knowledge Analysis (WEKA) tools. …”
Get full text
Get full text
Get full text
Article -
10
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Based on previous research using one of metaheuristic algorithms known as harmony search (HS), the generated schedule was still not optimum and cannot be solved maximally as there were too much repetitions of task (shift and route) occurred among drivers. …”
Get full text
Get full text
Get full text
Thesis -
11
A novel association rule mining approach using TID intermediate itemset
Published 2018Get full text
Get full text
Article -
12
On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems
Published 2020“…In conclusion, the proposed low-complexity iterative algorithm can be used to maximize the EE based on the maximum transmit power , where the noise power is less than the power of the received pilot sequence.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
14
Energy-Efficient Low-Complexity Algorithm in 5G Massive MIMO Systems
Published 2021“…Simulation results demonstrate that the maximal EE was achieved using the iterative LCA based on reasonable maximum transmit power, in the case the noise power is less than the received power pilot. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022“…Nextgeneration networks are envisioned to support management to maximize the user s ’ dynamic and agile network quality of service (QoS). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman
Published 2017“…This study made an attempt to incorporate knowledge transfer-related variables (articulability of knowledge, credibility of knowledge source, gap of theory-practice, embedded knowledge and environmental uncertainty) into the framework. …”
Get full text
Get full text
Book Section
