Search Results - (( develop learning sensor algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan by Adenan, Muhammad Nasrul Hakim

    Published 2013
    “…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…To prevent such kinds of deadly scenarios, a reliable fall detection system must be developed to help many lives. In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  12. 12

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error as compared to a model with single learning algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error compare to a model with single learning algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Design and development of cooperative simultaneous localization and mapping integrated with neural network for mobile robot by Jamaludin, Amirul

    Published 2024
    “…From the results, it can be concluded that the development of CSLAM algorithm integrated with ANN able to improve the performance of CSLAM for mobile robot using low-cost sensor.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A wheelchair sitting posture detection system using pressure sensors by Mohamad Yusoff, Muhammad Annuar Alhadi, Azmi, Nur Liyana, Nordin, Nor Hidayati Diyana

    Published 2024
    “…Three classification algorithms based on the supervised learning of machine learning, such as support vector machine (SVM), random forest (RF),and decision tree (DT) were used to classify the postures which produced an accuracy of 95.44%, 98.72%,and 98.80%, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.] by Afolabi, Akindele Segun, Akinola, Olubunmi Adewale, Odetoye, Oyinlolu Ayomidotun, Adetiba, Emmanuel

    Published 2025
    “…These algorithms were applied to data from environmental sensors such as temperature, humidity, carbon dioxide (CO2), and light sensors, and afterward. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project