Search Results - (( java implementation path algorithm ) OR ( using users learning algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- learning algorithm »
- path algorithm »
- users learning »
- using users »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…GA assists in optimizing the search process and performs machine learning. Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
Conference paper -
6
Extreme learning machine for user location prediction in mobile environment
Published 2011“…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Extreme learning machine for user location prediction in mobile environment
Published 2011“…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Phishing attack detection using machine learning method
Published 2019“…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
An adaptive HMM based approach for improving e-Learning methods
Published 2023“…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
Conference Paper -
10
Estimating Depressive Tendencies Of Twitter User Via Social Media Data
Published 2023“…We will use these three machine learning algorithms to compare the accuracy and performance of the depressed twitter user. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Predicting user trajectories using deep learning algorithms / Ahmad Zaki Aiman Abdul Rashid, Azita Laily Yusof and Norsuzila Ya’acob
Published 2025“…Due to this, this paper predicts user’s future trajectory from past trajectory utilizing deep learning (DL) algorithms which are Long-Short Term Memory (LSTM), BiDirectional LSTM, and Gated Recurrent Unit (GRU). …”
Get full text
Get full text
Get full text
Article -
13
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
14
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…History is one of the school subjects in Malaysian schools and known as a compulsory subject that is required to pass the SPM examination. One of the main learning methods in Malaysian education is by using textbooks as it is a universal formal school learning material and a dominant resource of learning. …”
Get full text
Get full text
Thesis -
15
Applying learning to filter text
Published 2005“…Text filtering has been a successful application especially in e-mail filtering. The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
Get full text
Get full text
Conference or Workshop Item -
16
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…Simulation results demonstrate improved performance in power consumption, load, sum rate, utility, learning rate, convergence, and energy efficiency for small base stations (SBSs) and user equipment (UEs) compared to four benchmarked algorithms, including WMMSE, game theory, Q-learning, and DRL. …”
Get full text
Get full text
Thesis -
17
Multilingual Ontology Learning Algorithm for Emails
Published 2023“…In this research, we have explained the necessity for utilizing multilingual ontology learning processes to solve this problem. We have proposed the multilingual ontology learning algorithm for semantic email. …”
Conference paper -
18
User song preferences using preference learning in artificial intelligence
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
20
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…The usefulness of using the user's tweet to measure depression studies using a literature review. …”
Get full text
Get full text
Thesis
