Search Results - (( basic mobile learning algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…The four basic behaviours of mobile robot are chasing, approaching, avoiding and escaping. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Mobile application for sign language learning with real time feedback by Lee, Xiao Xu Alexis

    Published 2024
    “…Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Campus study buddy : collaborative learning and resource sharing app by Huang, Yifan

    Published 2024
    “…The final deliverable of the project is an Android mobile application that integrates Google Cloud and Google Firebase while providing basic functions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    SnapShare: AI Trained Mobile App to Share Snaps Automatically by Waqas, Ahmad, Gilal, Abdul Rehman, Khan, Adil, Omar, Mazni, Chohan, Murk, Gilal, Ruqaya

    Published 2020
    “…SnapShare basically uses Deep learning (DL) and Machine Learning (ML) techniques for Face Recognition from the captured images. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil by Idris, Siti Aishah, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…Therefore, the most recently published research studies have suggested machine learning techniques as an alternative method to detect Android malware due to their ability to learn and use the existing information to detect the new Android malware apps. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…DSR is based on the concept of source routing. For this protocol, mobile nodes are required to maintain route caches that contain the source routes of which the mobile is aware. …”
    Get full text
    Get full text
    Thesis