Search Results - (( java implementation path algorithm ) OR ( using approval process algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- process algorithm »
- path algorithm »
- approval »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
6
Development of mobile application of event assistant and booking sport facilities for UiTM Seremban 3 Campus using wofkflow management system / Ahmad Haiqal Abd Halim, Ahmad Yusuf...
Published 2019“…The algorithm for the WfMS is written using Java script in this research. …”
Get full text
Get full text
Student Project -
7
Analysis and comparison of classification algorithms for credit approval in Islamic banks
Published 2025“…Using a dataset from an Islamic bank, the algorithms were assessed through precision, sensitivity, and accuracy metrics. …”
Get full text
Get full text
Get full text
Article -
8
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…Theresult of this system using the iris dataset and credit card approval dataset to evaluate the proposed algorithm's accuracy, interpretability. …”
Get full text
Get full text
Final Year Project -
9
Encryption using FPGA
Published 2008“…Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that can be used to protect electronic data. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Enhancing loan approval decision-making: an interpretable machine learning approach using LightGBM for digital economy development / Teuku Rizky Noviandy, Ghalieb Mutig Idroes and...
Published 2024“…This study aims to enhance loan approval decision-making in the digital economy using an interpretable machine learning approach. …”
Get full text
Get full text
Article -
11
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Get full text
Get full text
Thesis -
12
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
13
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Therefore, there is a strong need to automate this process. Such automated systems must rely on robust and effective algorithms for detection and prediction. …”
Get full text
Article -
14
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…In model development, Ant-Miner was used which consists of three steps. In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
Get full text
Get full text
Student Project -
15
A Single Objective Flower Pollination Algorithm for Modeling the Horizontal Flexible Plate System
Published 2020“…Thus, this project presents the modelling of horizontal flexible plate system using bio-inspired flower pollination algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
16
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. …”
Book Chapter -
17
A fuzzy decision support system for personal loan application / Muhammad Mustaqim Md Said
Published 2017“…This paper discuss the implementation of decision support system for personal loan applicant using fuzzy logic in banking institution. This algorithm being implemented in order to help customer in identifying the suitable personal loan scheme. …”
Get full text
Get full text
Thesis -
18
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
Get full text
Get full text
Thesis -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
20
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis
