Search Results - (( java implementation path algorithm ) OR ( using context matching algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
    text::Thesis
  6. 6
  7. 7

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding by Sarwar, Talha, Mohd Noor, Noorhuzaimi Karimah, Miah, M. Saef Ullah

    Published 2022
    “…Therefore, automatically finding similar news articles can be a significant task in text processing. In this context, keyphrase extraction algorithms can extract information from news articles. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…The experimental results indicated that the random forest algorithm demonstrated effective prediction abilities, with actual crime rates closely matching the predicted rates in both test and experimental samples. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali by Mat Razali, Rabiatul Addawiyah

    Published 2017
    “…Besides that, the performance of this technique is analyzed by using a Cloudsim simulator. Based on the analysis, positive results of the proposed algorithm are demonstrated, which shows the load balancing process is shown to have improved based on the distribution of virtual machines onto matching-type of resources, while a more efficient migration of virtual machines can be seen based on the defined CPU usage thresholds. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Oral Dictionary by Md. Radzi, Ashylla

    Published 2006
    “…Currently, the scope of Oral Dictionary only cover 100 words, within the noun context and using British English (Br.E) standard, as it is English language correctly spoken or written. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  15. 15
  16. 16

    Novel reservoir system simulation procedure for gap minimization between water supply and demand by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, El-Shafie, Ahmed

    Published 2019
    “…In this research, an optimization algorithm, namely, the shark machine learning algorithm (SMLA) that has high inertia for obtaining its targets, is proposed that mimics the natural shark process. …”
    Get full text
    Get full text
    Article
  17. 17

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In word segmentation, related algorithms can be divided into three categories: based on string matching, based on understand and based on statistics [1]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  18. 18

    Designing of prediction model for parameter optimization in cnc machining based on artificial neural network / Armansyah ... [et al.] by Armansyah, Puji, Muhammad Nurul, Mardhani, Muhammad Destri, Suartana, I Putu Eka, Desmawati, Ferdyanto, Kusumah, Muhammad Afiff, Yafi, Muhammad Umar, Saedon, Juri

    Published 2025
    “…Furthermore, error evaluation using normalized root mean square error (NRMSE) revealed a low error rate of 3.79%, which is considered highly acceptable, particularly in the context of polishing.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Artificial immune systems (GA-AIS) enabled power loss mitigation in distributed generation: X3PAIS optimization approaches by Ahmed O.A., Chong K.H., Koh S.P., Yaw C.T., Pasupuleti J.

    Published 2025
    “…In the context of power distribution, X3PAIS is used in the multiple DG architecture of the power distribution system, reducing power losses by placing DG units in the best locations and sizing them to match load profiles. …”
    Article
  20. 20

    Semantic query translation for Quran content retrieval / Mohd Amin Mohd Yunus by Mohd Amin , Mohd Yunus

    Published 2014
    “…Existing Quran retrieval system suffers from low precision and recall mainly due to the query technique used particularly in cross language retrieval (CLIR). …”
    Get full text
    Get full text
    Thesis