Search Results - (( java implementation path algorithm ) OR ( using modern mining algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- mining algorithm »
- path algorithm »
- using modern »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…MATLAB is used in developing and validation the algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Market Basket Analysis for E-Commerce using Association Rule Mining
Published 2020“…The author has developed an ecommerce system which has back-end system to display the performance of the product and using Association Rule Mining on the datasets. By using this system, they can know the hidden product relationships which product has the potential to be purchase together. …”
Get full text
Get full text
Get full text
Article -
7
Detecting Critical Least Association Rules In Medical Databases
Published 2010Get full text
Get full text
Article -
8
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. While a rather simplistic and dated algorithm, it remains widely used and taught till this day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Transliteration engine for union catalogue of Malay manuscripts in Malaysia: E-Jawi version 3
Published 2018“…There are several online transliteration tools in web version available for modern Jawi to Rumi and vice versa, however is not available for old Jawi, which was widely used in old Malay manuscripts. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Clustering of rainfall data using k-means algorithm
Published 2019“…Clustering algorithms in data mining is the method for extracting useful information for a given data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…This study analyzed the levels of minor, moderate, and severe traffic accidents in the Palembang Police area from 2015 to 2020 using association rule mining and the apriori algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Article -
14
A Data Mining-Based Model for Assessing Guangzhou's Higher Vocational Colleges 'New Energy Automobile Majors' Vocational Skills
Published 2024“…The approach employs algorithms for data mining to enhance the accuracy and accessibility of results through the use of Random Forest (RF) and Generalized Additive Models (GAM) in a layering architecture. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Sentiment Analysis of Cyberbullying in Social Media Using Decision Trees
Published 2020“…The given paper describes modern approach to the task of sentiment analysis of cyberbullying in social media by using decision trees. …”
Get full text
Get full text
Final Year Project -
17
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
Get full text
Get full text
Thesis -
18
The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan
Published 2022“…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
Get full text
Get full text
Book Section -
19
Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election
Published 2024“…Election dynamics are examined using the naïve Bayes approach. To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
Get full text
Get full text
Get full text
Journal -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
