Search Results - (( _ validating using algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Enhance luhn algorithm for validation of credit cards numbers. by Hussein, Khalid Waleed, Mohd. Sani, Nor Fazlida, Mahmod, Ramlan, Abdullah @ Selimun, Mohd Taufik

    Published 2013
    “…The Luhn algorithm is the first line of defense in many e-commerce sites and is used to validate a variety of identification numbers such as credit card numbers. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6

    Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz by Aziz, Azwani

    Published 2010
    “…This problem can be solved by cluster validity index. Cluster validity index is needed to find the suitable number of cluster, c in any fuzzy clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness [1]. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm by Ariff Nijay, Ramli

    Published 2023
    “…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. An automotive company is selected, and the collected actual data is used for validation purposes. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Phylogenetic tree classification system using machine learning algorithm by Tan, Jia Kae

    Published 2015
    “…The leave-out one cross-validation was used to calculate the accuracy of each feature. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport by Toh , Yi Feng

    Published 2017
    “…However, manual debugging is still widely used in post-silicon validation and is a major bottleneck in the validation process. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis