Search Results - (( developing learning commitment algorithm ) OR ( java applications usage algorithm ))
Search alternatives:
- commitment algorithm »
- learning commitment »
- applications usage »
- java applications »
- usage algorithm »
-
1
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
3
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Phishing attack detection using machine learning method
Published 2019“…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
A novel navigation algorithm for collaborative multi robots
Published 2010“…But present unique challenges for developing collaborative navigation algorithm and coordination among themselves are not sufficient for autonomous collaborative tasks. …”
Get full text
Get full text
Get full text
Article -
6
A collaborative navigation algorithm for multi-agent robots in autonomous reconnaissance mission
Published 2010“…But present unique challenges for developing collaborative navigation algorithm and coordination among themselves are not sufficient for autonomous collaborative tasks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
8
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
text::Thesis -
9
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…The Whale Optimisation Algorithm (WOA), Harris Hawks Optimisation (HHO) Algorithm, Lévy Flight WOA (LFWOA) and the Opposition-Based Learning of HHO (OBL-HHO) were proposed to simulate the initial model’s response and optimise the Klang Gate Dam (KGD) release operation with observed inflow, water level (storage), release, and evaporation rate (loss). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Bornean Orangutan nest classification using Image enhancement with convolutional neural network and kernel multi support vector machine classifier
Published 2025“…To address this, we propose automating the classification of captured images using machine learning algorithms. This research involves three key components: image processing, feature extraction, and image classification. …”
Get full text
Get full text
Get full text
Article -
11
Bornean Orangutan Nest Classification using Image Enhancement with Convolutional Neural Network and Kernel Multi Support Vector Machine Classifier
Published 2025“…To address this, we propose automating the classification of captured images using machine learning algorithms. This research involves three key components: image processing, feature extraction, and image classification. …”
Get full text
Get full text
Get full text
Get full text
Article
