Search Results - (( java implementation path algorithm ) OR ( thinking process generating algorithm ))
Search alternatives:
- generating algorithm »
- java implementation »
- implementation path »
- process generating »
- thinking process »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
WHAT DO YOU THINK ABOUT AI vs HUMAN MADE ART?
Published 2024Get full text
Get full text
Book Chapter -
6
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Since the key exchange process is successful, we think the offered methods are effective.…”
Get full text
Get full text
Student Project -
7
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…The advantages of both algorithms are used to balance the exploration and exploitation in the searching process. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
9
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
10
AMI screening using linguistic fuzzy rules
Published 2010“…Since there is a tradeoff in the fuzzy system between the accuracy which measures the capability of the system to predict the diagnosis of AMI and transparency which reflects its ability to describe the symptoms-diagnosis relation in an understandable way, the proposed fuzzy rules are designed in a such a way to find an appropriate balance between these two conflicting modeling objectives using multi-objective genetic algorithms. The main advantage of the generated linguistic fuzzy rules is their ability to describe the relation between the symptoms and the outcome of the diagnosis in an understandable way, close to human thinking and this feature may help doctors to understand the decision process of the fuzzy rules.…”
Get full text
Get full text
Get full text
Article -
11
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
12
Predicting game-induced emotions using EEG, data mining and machine learning
Published 2024“…Conclusion The fndings in this study fll the existing gap of game-induced emotion recognition feld by providing an in-depth evaluation on the ruleset algorithm’s performance and feasibility of applying the generated rules on the game-induced EEG data for justifying the emotional state prediction result.…”
Get full text
Get full text
Get full text
Article -
13
What, how and when to use knowledge in neural network application
Published 2004“…These weights are assigned randomly or generated using other procedures such as Nguyen-Widrow initialization algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
User-guided Database Schema Generation For Naive Database Developers
Published 2014“…At the end of research, researcher are expected to the generate algorithms and initial prototype for the formulated method to provide a user-friendly platform for the developer or user to reduce the above issue. …”
Get full text
Get full text
Final Year Project -
15
Objective quantification of selective attention in schizophrenia a hybrid TMS – EEG approach
Published 2017“…The aim of the study is to quantify objectively the neural correlate of selective attention that reflected in auditory late responses (ALRs) using signal processing techniques. TMS provides a means of stimulating neuronal structures within the cortex using brief time-varying magnetic pulses generated by a coil positioned over the scalp. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
