Search Results - (( developing implementation developing algorithm ) OR ( its implementation learning algorithm ))

Refine Results
  1. 1

    DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES by HANIZAM, MOHD HAZIQ NAZMI

    Published 2019
    “…The deep-learning algorithm to be deployed is Faster R-CNN and to be implemented using MATLAB. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
    Get full text
    Learning Object
  4. 4

    Development of a genetic algorithm controller for cartesian robot by Ong, Joo Hun

    Published 2008
    “…The electrical design involves wiring of control components such as the stepper motor controller, input and output devices as well as the power supply and the safety devices. Finally, the developed algorithm will been tested and implemented into in this Cartesian robot system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…This algorithm has been tested and implemented successfully via a dual beam optical scanning system.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…In this study, methods of K-Mean Clustering, Euclidean Distance and Cosine Similarity are implemented. These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…This study looks at developing a behavior-based algorithm that adaptable to several different environment configurations. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
    Get full text
    Get full text
    Article
  10. 10

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Compared to classical fuzzy numbers, z-numbers has ability to describe the human knowledge because it has both restraint and reliability part in its definition. Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…By removing these irrelevant and redundant features accuracy of the learning algorithms can be increased. In this paper implementation of different feature selection techniques have been reviewed. …”
    Get full text
    Get full text
    Article
  14. 14

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…Therefore, optimizations are desirable especially when software implementation is preferred for its flexibility as compared to hardware implementation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  20. 20

    Age And Gender Recognition Mobile App by Wee, Quo Lung

    Published 2023
    “…Therefore, this study aimed to develop age and gender recognition mobile application using deep learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD