Search Results - (( basic information data algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- basic information »
- information data »
- java application »
- data algorithm »
-
1
-
2
-
3
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Direct approach for mining association rules from structured XML data
Published 2012“…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
Get full text
Get full text
Thesis -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
8
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The combination usage of the algorithm, AVL, GPS and SMS server, the information regarding the time arrival of the transport can easily being retrieve by users. …”
Get full text
Get full text
Final Year Project -
10
Web usage mining for UUM learning care using association rules
Published 2004“…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
Get full text
Get full text
Thesis -
11
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
12
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…The enormous of information on the World Wide Web makes it obvious candidate for data mining research. …”
Get full text
Get full text
Get full text
Thesis -
13
CSC562: Information Retrieval and Searching Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
14
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
15
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware part is developed for abdominal Electrocardiography (AECG) data acquisition system. Individual algorithms and customized application software are developed using Visual Basic for both the networking and Fetal Heart Rate (FHR) monitoring systems. …”
Get full text
Get full text
Get full text
Article -
16
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022“…In combinatorial design theory, clustering elements into a set of three elements is the heart of classifying data, which has recently received considerable attention in the fields of network algorithms, cryptography, design and analysis of algorithms, statistics, and Information theory. …”
Get full text
Get full text
Get full text
Article -
18
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…The methodology used in the development of this project is basically based on the eight major steps. There are problem assessment, data acquisition, cropping, pre-processing, design, training, testing and documentation. …”
Get full text
Get full text
Thesis -
19
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
20
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Cryptography is the way of storing and transmitting data by convert the information into unreadable cipher for security which only intended sender and receiver only could access. …”
Get full text
Get full text
Thesis
