Search Results - (( java implementation path algorithm ) OR ( using mobile machine algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- machine algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In order to overcome this issue, machine vision embedded with deep learning algorithm can be implemented. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
7
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
8
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Purpose – Prediction accuracies are usually affected by the techniques and devices used as well as the algorithms applied. This work aims to attempt to further devise a better positioning accuracy based on location fingerprinting taking advantage of two important mobile fingerprints, namely signal strength (SS) and signal quality (SQ) and subsequently building a model based on extreme learning machine (ELM), a new learning algorithm for single-hidden-layer neural networks. …”
Get full text
Get full text
Get full text
Article -
9
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
10
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
11
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Purpose – Prediction accuracies are usually affected by the techniques and devices used as well as the algorithms applied. This work aims to attempt to further devise a better positioning accuracy based on location fingerprinting taking advantage of two important mobile fingerprints, namely signal strength (SS) and signal quality (SQ) and subsequently building a model based on extreme learning machine (ELM), a new learning algorithm for single-hidden-layer neural networks. …”
Get full text
Get full text
Get full text
Article -
12
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
Get full text
Get full text
Get full text
Article -
13
A machine learning approach to tourism recommendations system
Published 2025“…Model with the highest accuracy will be integrated into a tourism recommendation mobile application. A high portability and mobility mobile application will be developed by using React Native, and the dataset used in developing will be obtained from Google API. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
15
Insomnia audio therapy mobile application with music recommender system / Nur Azmina Mohamad Zamani, Nasiroh Omar and Nur Damira Huda Azmi
Published 2022“…The results indicated that Random Forest performed as the best machine learning algorithm in predicting the relevant music. …”
Get full text
Get full text
Get full text
Article -
16
Mobile application: coin identification using machine learning / Dania Qistina Mohd Nazly
Published 2021“…Most of the human work has been replaced by computers in recent years. With the rise of mobile technology and Internet access, recent developments in machine learning have designed many algorithms to solve diverse human problems. …”
Get full text
Get full text
Thesis -
17
Quantifying usability prioritization using K-means clustering algorithm on hybrid metric features for MAR learning
Published 2023Conference Paper -
18
-
19
-
20
NLP- based for providing mental health support in mobile application / Muhammad Amirul Roslan
Published 2025“…Future enhancements, such as advanced machine learning algorithms and user interface improvements, are proposed to further enhance functionality. …”
Get full text
Get full text
Thesis
