Search Results - (( construct validity learning algorithm ) OR ( java data connection algorithm ))
Search alternatives:
- connection algorithm »
- construct validity »
- learning algorithm »
- data connection »
- java »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Reinforcement learning in risk management for pharmaceutical construction projects: frontiers, challenges, and improvement strategies
Published 2025“…Therefore, this paper reviews the practical applications of six algorithms—Deep Q-Network (DQN), Deep Deterministic Policy Gradient (DDPG), and Proximity Policy Optimization (PPO)—in construction safety, temperature control, resource scheduling, and automated equipment optimization, validating the potential of reinforcement learning to effectively manage dynamic risks through adaptive learning. …”
Get full text
Get full text
Get full text
Article -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…The deep learning model was trained with stochastic data to predict the noise levels emitted from the construction site. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
6
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
7
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. However, twin tunnel construction in urban areas commonly faces surface settlement (SS) issues, which threaten nearby structures. …”
Get full text
Get full text
Get full text
Thesis -
8
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
11
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
12
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
Deep learning for EEG data analysis
Published 2018“…The convolutional neural network (CNN) model constructed in this project has achieved a validation accuracy of 75±1% using the same EEG dataset. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction
Published 2018“…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Iris data set has been taken from UCO machine learning to assist in testing phase. The validity of the result for this web tool will be determined by the average score of the silhouette method. …”
Get full text
Get full text
Thesis -
18
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
19
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023“…The classifiers are validated and evaluated using accuracy, precision, recall, and f1-score along with 10-folds cross validation. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…In realizing this concept, we consider the advantages of data passing between two web services which each are connected with one or multiple set of clusters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
