Search Results - (( developing continuous learning algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1
  2. 2

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao by He , Biao

    Published 2024
    “…The developed model is expected to possess the ability of continual learning, which is particularly advantageous in dynamic environments like tunnel blasting. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
    Article
  7. 7

    Development of algorithm for improved maze navigation by Ahmad, Faiz Aydil

    Published 2014
    “…This paper describes the development of algorithm for improved maze navigation and it is a continuation on a previous project. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Learning style analysis based on Felder-Silverman Index Model using Rule Base algorithm by Nurhakim, Muhammad, Ismail, Suhaila, Mohd Yusop, Nurhafizah Moziyana, Ahmad, Siti Rohaidah

    Published 2024
    “…To overcome this concern, the Learning Style Analysis System (SAGP) was developed to identify and provide recommendations based on individual learning styles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…It discusses recent machine learning and deep learning work with various network implementations, applications, algorithms, learning approaches, and datasets to develop an operational intrusion detection system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…In the cycle of Industrial Revolution 4.0 (IR 4.0), many issues in the industries can be solved with implementation of artificial intelligence approaches, including machine learning models. Designing an effective machine learning model for prediction and classification problems is a continuous effort. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    PREDICTING THE PRICE OF COTTON USING RNN AND LSTM by MOHAMAD, AHMAD LUKMAN

    Published 2020
    “…The accuracy of each machine learning algorithm will be recorded and analyze to come up with the best model for the dataset. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    A New Quadratic Binary Harris Hawk Optimization For Feature Selection by Abdullah, Abdul Rahim, Too, Jing Wei, Mohd Saad, Norhashimah

    Published 2019
    “…However, the original HHO is developed to solve the continuous optimization problems, but not to the problems with binary variables. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…Numerous studies implemented machine learning algorithms to develop an effective IDS; however, with the advent of deep learning algorithms and artificial neural networks that can generate features automatically without human intervention, researchers began to rely on deep learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deep learning convolutional neural network algorithms for the early detection and diagnosis of dental caries on periapical radiographs: a systematic review by Musri, Nabila, Christie, Brenda, Ichwan, Solachuddin Jauhari Arief, Cahyanto, Arief

    Published 2021
    “…Identifying caries with a deep convolutional neural network-based detector enables the operator to distinguish changes in the location and morphological features of dental caries lesions. Deep learning algorithms have broader and more profound layers and are continually being developed, remarkably enhancing their precision in detecting and segmenting objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    SYSTEMATIC DESIGN OF SIMPLY STRUCTURED COMPENSATOR by FUNG , CHUN TING

    Published 2005
    “…In this project, the algorithm of the tuning method based on Nyquist Stability Criterion is developed first. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Real time long range (LoRa) based indoor positioning system using Deep Gaussian Process (DGP) algorithm / Ng Tarng Jian by Ng, Tarng Jian

    Published 2025
    “…These findings highlight the potential of combining LoRa technology with advanced machine learning algorithms and filtering techniques to achieve precise and reliable indoor tracking. …”
    Get full text
    Get full text
    Get full text
    Thesis