Search Results - (( based replication learning algorithm ) OR ( java application during algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
    Get full text
    Get full text
    Article
  4. 4

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
    Get full text
    Get full text
    Thesis
  5. 5

    HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text by Islam, Md Shofiqul, Sultana, Sunjida, Debnath, Uttam Kumar, Al Mahmud, Jubayer, Islam, S. M. Jahidul

    Published 2021
    “…On a variety of datasets, our proposed HARC algorithm solution outperformed traditional machine learning approaches as well as comparable deep learning models by a margin of 1%. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices by Sheikh, Abdul Manan, Islam, Md. Rafiqul, Habaebi, Mohamed Hadi, Zabidi, Suriza Ahmad, Najeeb, Athaur Rahman, Baloch, Mazhar

    Published 2026
    “…The predictive performance of five machine learning algorithms, i.e., Support Vector Machines, Logistic Regression, Artificial Neural Networks with a Multilayer Perceptron, K-Nearest Neighbors, and Gradient Boosting, was analyzed, and the results showed an average accuracy of approximately 60%, demonstrating the strong resistance of the RO PUF to these attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    A novel approach to motion modeling using fuzzy cognitive map and artificial potential fields by Motlagh, Omid Reza Esmaeili, Tang, Sai Hong, Ramli, Abdul Rahman, Ismail, Napsiah, Nakhaeinia, Danial

    Published 2010
    “…A novel decision modeling technique is developed based on capabilities of the fuzzy cognitive map (FCM) and supervised learning using the genetic algorithm (GA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Assessment of suitable hospital location using GIS and machine learning by Almansi, Khaled Y. M.

    Published 2022
    “…Third, an insight into the machine learning models utilized and how their predicted weights affect hospital site suitability mapping was provided. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…Complementary K-Means clustering grouped the data into two major clusters, indicating that a clear differentiation between economic-based and entrepreneurship-based courses in terms of student enrolment volume and approval distribution. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…Different machine learning algorithms (Artificial Neural Network [ANN], K Nearest Neighbor [KNN] and Support Vector Machine [SVM]) were tested individually and with various ensemble models (bagging, voting, and boosting) to detect the probability of the landslide and rockfall occurrences. …”
    Get full text
    Get full text
    Thesis