Search Results - (( java implementation path algorithm ) OR ( using extraction learning algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- extraction learning »
- learning algorithm »
- using extraction »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Sentiment analysis for airline services on Twitter using deep learning with word embedding / Mawada Mohamed Nour El Daim El Khalifa
Published 2020“…This problem has led to low accuracy in predicting Airline Services using Twitter data. Meanwhile, in recent years, Deep Learning algorithms for Sentiment Analysis has emerged as one of the most popular algorithms, which provides automatic feature extraction, rich representation capabilities, and better performance than most of the traditional learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
6
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Traditional learning-based boundary extraction algorithms classify each pixel edge separately and then get boundaries from the local decisions of a classifier. …”
Get full text
Get full text
Thesis -
7
Static hand gesture recognition using artificial neural network / Haitham Sabah Hasan
Published 2014“…The back-propagation learning algorithm is employed in the multi-layer neural network classifier. …”
Get full text
Get full text
Thesis -
8
EEG-based emotion recognition using machine learning algorithms
Published 2024“…Thus, this project proposed an optimised machine learning algorithms to classify emotion by analysing brain activity using Electroencephalogram (EEG) signals. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Predicting hearing loss symptoms from Audiometry data using FP-Growth Algorithm and Bayesian Classifier
Published 2013“…FP-Growth (frequent pattern growth) algorithm was employed as a feature extraction technique. …”
Get full text
Get full text
Article -
11
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
Get full text
Get full text
Thesis -
12
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Context-driven satire detection with deep learning
Published 2022“…Finally, the combined feature sets undergoes the classification using well-known machine learning classification algorithms. …”
Get full text
Get full text
Article -
14
An Improvement on Extended Kalman Filter for Neural Network Training
Published 2005“…This study explored the training of a neural network inference system using the extended Kalman filter (EKF) learning algorithm. …”
Get full text
Get full text
Thesis -
15
Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm
Published 2025Subjects:Article -
16
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…As the components of big data continue to expand, the task of extracting useful information becomes critical. Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
Get full text
Get full text
Article -
17
Combining deep and handcrafted image features for MRI brain scan classification
Published 2019“…In this paper, a deep learning feature extraction algorithm is proposed to extract the relevant features from MRI brain scans. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Design of Predictive Model for TCM Tongue Diagnosis In Malaysia Using Machine Learning
Published 2020“…Six supervised machine learning algorithms (Linear Regression, Logistic Regression, K Nearest Neighbors (KNN), Decision Trees (DT), Support Vector Machine (SVM) and Random Forest) are used to perform disease prediction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Postprocessing algorithm for security features extraction
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item
