Search Results - (( java implementation path algorithm ) OR ( using data window algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- window algorithm »
- path algorithm »
- data window »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
6
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA
Published 2012“…The SW learning is investigated with different resetting criterion, diierent step size choices and different window sizes in addition to improving the existing SW module by proposing different data store management @SM) techniques that is used to reduce correlation inside the window store. …”
Get full text
Get full text
Thesis -
8
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
Published 2016“…Crucial to this is the width of the sliding window. This study utilized raw data from network traffic and built a Neural Network (NN) model trained with the Cuckoo Search (CS) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…EWR is a fully online clustering technique for handling high-dimensional data streams using feature ranking and sorting. This process is accomplished by calculating the entropy of specific features with respect to the time window. …”
Article -
10
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…Current research on tackling uncertainty revolves around creating specifically tailored algorithms that can operate in the presence of value uncertainty using both a count-based and a time-based approach. …”
Get full text
Get full text
Get full text
Thesis -
11
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The algorithm output can use any length of data input. …”
Get full text
Get full text
Get full text
Article -
12
Application of a simple mono window land surface temperature algorithm from landsat ETM+ over al Qassim, Saudi Arabia
Published 2012“…This study was conducted to retrieve the land surface temperature (LST) from Landsat ETM+ data for Al Qassim, Saudi Arabia. The proposed technique employed a mono window LST algorithm for retrieving surface temperature from Landsat ETM+. …”
Get full text
Get full text
Get full text
Article -
13
An enhancement of sliding window algorithm for rainfall forecasting
Published 2017“…The validation analysis shows that the proposed method has a higher forecasting accuracy than the previous method of sliding window algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The SD analysis for texture detection is novel as it uses a combination of arithmetic processes. It windows the data sequentially and calculates the SD of the data in the windows and then averages the SDs. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
CC_TRS: continuous clustering of trajectory stream data based on micro cluster life
Published 2017“…The evaluation of the proposed algorithm on real data sets shows the efficiency and the effectiveness of the proposed algorithm and proved it is efficient alternative to time window technique.…”
Get full text
Get full text
Get full text
Article -
17
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
Get full text
Get full text
Student Project -
18
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The use of the SHA-256 hash algorithm currently considered secure and resistant to collision attacks. …”
Get full text
Get full text
Get full text
Article -
19
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
20
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…However, it is a vital process for many applications such as traffic management, studying of animal behavior, and weather forecasting. Many existing algorithms for stream clustering of trajectory stream data exploit the time window technique which partition trajectory stream data into time-bins and cluster the segments in each timebin separately. …”
Get full text
Get full text
Thesis
