Search Results - (( basic interactive learning algorithm ) OR ( java application during algorithm ))
Search alternatives:
- interactive learning »
- learning algorithm »
- application during »
- basic interactive »
- java application »
- during algorithm »
-
1
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…Interactive Learning Package for Artificial Neural Network (Demonstration Module) is a learning package that allow the users to learn and enhance the understanding of the ANN subject in more detailed way and apply in the demonstration parts. …”
Get full text
Get full text
Thesis -
2
An interactive C++ programming courseware (SIFOO) / Mazliana Hasnan … [et al.]
Published 2012Get full text
Get full text
Book Section -
3
CT-eKit: computational thinking interactive learning / Ong Sing Ling, Jill Ling and Fetylyana Nor Pazilah
Published 2023“…The CT-eKit consists of three main activities: a CT video, a Kahoot CT quiz and a Scratch CT Concepts game to learn the four CT concepts: decompose, pattern, abstraction and algorithm in a fun and interactive environment. …”
Get full text
Get full text
Book Section -
4
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
Get full text
Get full text
Thesis -
5
The A-rray: visual animation in learning structured programming / Wan Salfarina Wan Husain ,Siti Hasrinafasya Che Hassan and Wan Norliza Wan Bakar
Published 2018“…The visual animation is considered to be a very promising potential to aid students in learning and understanding the algorithm concept in programming. …”
Get full text
Get full text
Get full text
Article -
6
Mobile application for sign language learning with real time feedback
Published 2024“…Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Kodepoly: an engaging approach to blended futuristic learning in coding
Published 2024“…This project introduces Kodepoly, a board game prototype inspired by Monopoly, designed to teach basic coding principles in a fun and interactive way. …”
Get full text
Get full text
Proceeding Paper -
8
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
9
Simulation on Emotion Recognition for Autism Therapy
Published 2017“…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. The program will be used by the therapist during therapy session with the autism child in order to create more exciting environment for them to learn about the classification of basic human emotions with the help of human-computer interaction. …”
Get full text
Get full text
Final Year Project -
10
The design for antrophomorphic sociable agent interaction through emotion detection
Published 2003“…This research works addresses on faces features through simulation of anthropomorphic agent.A salience feature of this definition of emotion is described in terms of goals and roles.Therefore, it provides a basic framework of goal-driven processing, which is to investigate computational models of emotion.The main goal of this research is to provide a natural interaction scheme where the affective interaction emotive state of the user can be identified.One aspect of developing such a capability is the ability of the system to recognize emotional state using intelligent supervised learning algorithms, personality of the user and respond appropriately.An anthropomorphic agent will serve to express the reaction through affective feedback given. …”
Get full text
Get full text
Conference or Workshop Item -
11
Campus study buddy : collaborative learning and resource sharing app
Published 2024“…The application is developed using Flutter and uses a tag recommendation algorithm to push content that users may be interested in, thereby intelligently providing users with an online learning environment that suits them and improving their learning efficiency. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
SnapShare: AI Trained Mobile App to Share Snaps Automatically
Published 2020“…SnapShare basically uses Deep learning (DL) and Machine Learning (ML) techniques for Face Recognition from the captured images. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
17
Improving neural networks training using experiment design approach
Published 2005“…Randomly select the m data set for conventional training algorithm. One more data (m+ 1) is entered to train the NN again. …”
Get full text
Get full text
Thesis -
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
