Search Results - (( java implementation path algorithm ) OR ( using key mining algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- mining algorithm »
- path algorithm »
- using key »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008“…Our algorithm is evaluated using two sets of DNA sequences with comparisons. …”
Get full text
Get full text
Get full text
Proceeding -
6
Comparative study of machine learning algorithms in data classification
Published 2025“…The results will help with real-world data mining applications of machine learning and be a useful guide for further study and practical applications.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
8
-
9
Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining
Published 2023“…Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
Get full text
Get full text
Thesis -
10
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
Get full text
Get full text
Get full text
Article -
11
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
Get full text
Get full text
Get full text
Article -
13
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
14
A Data Mining Approach to Enhancing Birth and Death Registration Processes
Published 2025“…Using k-means clustering, apriori association rules, and c5 decision trees, this research identifies key patterns influencing late registrations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Distribution and health risk assessment of trace metals in freshwater tilapia from three different aquaculture sites in Jelebu Region (Malaysia)
Published 2015“…Among the metals investigated, arsenic was found to be the key contaminant, which may have arisen from the use of formulated feeding pellets. …”
Get full text
Article -
16
Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining
Published 2023“…Therefore, the present study aims: (1) to improve Indonesian text summary by enhancing the Sequence of Word (SoW) as text representation using Sequential Pattern Mining (SPM) with PrefixSpan algorithm since the effectiveness of SPM in Indonesian is proven useful for text classification and clustering; (2) to combine SPM and Deep Learning (DeepSPM) in text summarization with Indonesian text, as a result of its superior accuracy when trained with large amounts of data; and (3) to evaluate the readability of Indonesian text summary with several evaluation scenarios. …”
Get full text
Get full text
Get full text
Thesis -
17
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…In this context, proposing Forensic Examination and Analysis Methodology using Data mining (FED) and Forensic Examination and analysis methodology using Data mining and Optimization (FEDO) models address these issues. …”
Get full text
Get full text
Thesis -
18
Simple quantum circuit for pattern recognition based on nearest mean classifier
Published 2016“…Machine learning plays a key role in many applications such as data mining and image recognition. …”
Get full text
Get full text
Article -
19
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Findings This research makes two key observations. Firstly, an algorithm with good performance metrics over a small data set collection may obtain worse results when the data set collection is extended. …”
Get full text
Get full text
Book Section -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
