Search Results - (( java implementation path algorithm ) OR ( pattern execution between algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- pattern execution »
- execution between »
- between algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Machine learning predictions of stock market pattern using Econophysics approach
Published 2025“…Hence, this research will be using Monte Carlo Simulation and identify which machine learning algorithm is suitable for predicting stock market patterns. …”
Get full text
Get full text
Book Section -
7
Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida
Published 2019“…Self-Organizing Feature (SOM) was used to visualize and identify the relationship and pattern between factors affecting mortality after ACS. …”
Get full text
Get full text
Get full text
Thesis -
8
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
Get full text
Get full text
Final Year Project -
9
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…Similarity search procedure is executed by an alignment process between query and targeted sequences. …”
Get full text
Get full text
Get full text
Article -
10
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…In this model, eight different LU and QR encoding method variants are evaluated in terms of execution time, the number of nonzero, and the pattern of nonzero. …”
Get full text
Get full text
Get full text
Thesis -
11
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article -
12
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…The result revealed that there is a strong correlation between execution time and throughput with a strength of 99.9% percent as confirmed by the Pearson correlation coefficient. …”
Get full text
Get full text
Thesis -
13
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…HPAs use parallel processors and assist in parallel execution of tasks with complex interdependency between data and operations. …”
Get full text
Get full text
Thesis -
15
Sales prediction for Adha Station by using predictive analytics
Published 2025“…This research presented a technique for projecting sales utilising current data through a machine learning algorithm. The CRISP-DM approach was employed to execute the project across the phases of business understanding, data preparation, modelling, assessment, and deployment. …”
Get full text
Get full text
Student Project -
16
Sustainable green energy management : Optimizing scheduling of multi-energy systems considered energy cost and emission using attractive repulsive shuffled frog-leaping
Published 2023“…The ARSFL algorithm demonstrates superior performance in managing and minimizing energy purchase uncertainty compared to the particle swarm optimization (PSO) and genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Article -
17
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
18
A framework for classification software security using common vulnerabilities and exposures
Published 2018“…The main research aim is to investigate what information is necessary to make a formal vulnerability pattern representation.This is done through the usage of formal Backus-Naur-Form syntax for the execution and presented with newly created vulnerability flow diagram.Some future works were also proposed to further enhance the elements in the secured soft-ware process framework.This thesis focuses on the research and development of the design, formalization and translation of the vulnerability classification pattern through a framework using common vulnerabilities and exposures data.To achieve this aim, the following work was carried out.First step is to create and conceptualized necessary meta-process.Second step is to specify the relationship between the classifiers and vulnerability classification pat-terns. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Composing multi-relations association rules from crowdsourcing remuneration data
Published 2022“…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
Get full text
Get full text
Get full text
Article -
20
STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
Published 2018“…In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. …”
Get full text
Get full text
Monograph
