Search Results - (( java implementation path algorithm ) OR ( programming data prevention algorithm ))
Search alternatives:
- prevention algorithm »
- java implementation »
- implementation path »
- programming data »
- data prevention »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
6
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
Get full text
Get full text
Thesis -
7
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Developing a predictive model for forest fires occurrence is an important activity in a fire prevention program. The model describes characteristics of areas where fires occur based on past fires data. …”
Get full text
Get full text
Get full text
Article -
8
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. Data level based methods are meant to solve the imbalanced classification problem based on the idea of making both classes equal in number. …”
Get full text
Get full text
Get full text
Thesis -
9
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…It is also found that using appropriate preventive maintenance program can cause up to 75% reduction in cell-load variation. …”
Get full text
Get full text
Thesis -
10
Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin
Published 2008“…Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
Get full text
Get full text
Thesis -
11
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
13
Building customer churn prediction models in Indonesian telecommunication company using decision tree algorithm
Published 2023“…This study uses data mining techniques with decision tree algorithms to predict customer churn in one of Indonesian Telecommunication companies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH
Published 2022“…The aforementioned technique is the MCDM method, particularly the fuzzy TOPSIS algorithm. This algorithm is embedded in the PV system to select the best PV components’ configuration based on multiple criteria. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
-
17
-
18
Risk assessment of dengue in Betong Sarawak using simple mathematical model
Published 2020Get full text
Get full text
Student Project -
19
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
20
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
Get full text
Get full text
Thesis
