Search Results - (( java implementation path algorithm ) OR ( learning coding learning algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Several machine learning techniques based on supervised learning have been adopted in the classification of malware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Kodepoly: an engaging approach to blended futuristic learning in coding by Abd Rahman, Norsyafrina, Azhar Amanullah, Ayn Nur Azhana

    Published 2024
    “…By combining the strategic elements of Monopoly with a curriculum comprised of coding challenges, debugging exercises, and algorithmic puzzles, Kodepoly aims to render the learning process both enjoyable and substantial in content. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Learning programming from source code examples is a common behavior among novices. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
    Get full text
    Get full text
    Article
  12. 12

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Attackers use code obfuscation to conceal malicious code, making it difficult for conventional systems and machine learning classifiers to detect threats. …”
    thesis::doctoral thesis
  14. 14

    Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL) by Ku, Soh Ting, Talib, Othman, Md. Yunus, Aida Suraya, Zolkepli, Maslina

    Published 2019
    “…There has been increased attention on learning coding in education field, in order to nurture sufficient number of young generation to fill in 50 percent of jobs opportunity in science, technology, engineering, and mathematics (STEM) which are computing-related. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Algorithm visualization design guidelines for mobile leaning by Supli, Ahmad Affandi, Shiratuddin, Norshuhada

    Published 2018
    “…This study is about the algorithm visualization design guidelines for mobile platform, to teach students data structures and algorithm (DSA) subject effectively. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A preliminary study of difficulties in learning java programming for secondary school by Majalin, M., Aslina Baharum, Ismail, R., Ismail, I., Ervin Gubin Moung, Noor, N.A.M.

    Published 2020
    “…One of the problems is students have difficulty in certain subtopics of programming. Coding to a specific task by using much complex algorithm is not an easy task as student needs to understand and know how to use it to solve a problem. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…This research is about the design and simulation on enhancement network security using machine learning. The design use MATLAB coding to show the simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis