Search Results - (( java implementation path algorithm ) OR ( using frequency mining algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Position score weighting technique for mining web content outliers. by Mustapha, Norwati, Mustapha, Aida

    Published 2013
    “…The existing mining web content outlier methods used stemming algorithm to preprocess the web documents and leave the domain dictionary in their root words. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, Khan

    Published 2011
    “…Dead-Stock (DS), Slow-Moving (SM) and Fast- Moving (FM) using K-means algorithm. In the second phase we have proposed Most Frequent Pattern (MFP) algorithm to find frequencies of property values of the corresponding items. …”
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…Dead-Stock (DS), Slow-Moving (SM) and Fast- Moving (FM) using K-means algorithm. In the second phase we have proposed Most Frequent Pattern (MFP) algorithm to find frequencies of property values of the corresponding items. …”
    Get full text
    Get full text
    Citation Index Journal
  12. 12
  13. 13

    Advanced data mining techniques for landslide susceptibility mapping by Ibrahim, M.B., Mustaffa, Z., Balogun, A.-L., Hamonangan Harahap, I.S., Ali Khan, M.

    Published 2021
    “…SVM, RT, and NBM algorithms were used to produce predicted datasets from the training datasets. …”
    Get full text
    Get full text
    Article
  14. 14

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2017
    “…There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Predicting game-induced emotions using EEG, data mining and machine learning by Min, Xuan Lim, Jason Teo

    Published 2024
    “…Thus, this paper is proposed to introduce the use of data mining techniques in investigating the relationships between the frequency changes of EEG signals and the human emotion elicited when playing diferent kinds of computer games. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance by Tan, Su Sze

    Published 2019
    “…Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
    Get full text
    Get full text
    Monograph
  19. 19

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
    Get full text
    Get full text
    Book Chapter
  20. 20

    A log file analysis technique using binary-based approach by Fageeri, S.O., Ahmad, R., Baharudin, B.

    Published 2014
    “…In this research paper, a binary-based approach for mining frequency of data items in database transaction log files is introduced. …”
    Get full text
    Get full text
    Article