Search Results - (( java implementation path algorithm ) OR ( user computing tree algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- user computing »
- computing tree »
- tree algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
7
Sentiment Analysis of Cyberbullying in Social Media Using Decision Trees
Published 2020Get full text
Get full text
Final Year Project -
8
-
9
-
10
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Malware is one of the most harmful forms of attack on computers because of its passive approach and hidden execution. …”
Get full text
Get full text
Student Project -
11
-
12
-
13
Phishing attack detection using machine learning method
Published 2019“…This is because some of the computer users do not install security system in their computer. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
14
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023Get full text
Get full text
Undergraduates Project Papers -
15
Window based personalized time management system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
-
20
Image Based Oil Palm Tree Crowns Detection
Published 2020Get full text
Get full text
Final Year Project Report / IMRAD
