Search Results - (( developing learning connection algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- connection algorithm »
- learning connection »
- validation using »
- java validation »
- using algorithm »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
Get full text
Get full text
Monograph -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah
Published 2010“…These entire elements will affect the speed of natural network learning. In this study, the optimization algorithm, PSO is chosen and applied in feedforward neural network to enhance the learning process. …”
Get full text
Get full text
Thesis -
5
Design and implemtation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayyawi
Published 2016“…An electronic board, transistor relay driver circuit, is designed for the purpose of establishing communication interface between the computer, adaptive learning algorithm and the actuator mechanism. Design and development an adaptive learning algorithm controller ALAC of position the actuators is presented in real time parallel manipulator based on artificial neural network ANN……”
Get full text
Get full text
Student Project -
6
Mobile application for sign language learning with real time feedback
Published 2024“…Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
8
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
10
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Phishing attack detection using machine learning method
Published 2019“…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
12
Micro-Crack Detection Of Solar Cells Featuring Adaptive Anisotropic Diffusion Filter And Semi-Supervised Support Vector Learning
Published 2014“…These properties together with the shape feature of the micro-crack are used in developing the detection algorithm. In this work, an image processing algorithm featuring an adaptive anisotropic diffusion filter and a segmentation technique based on twostage thresholding is proposed. …”
Get full text
Get full text
Thesis -
13
-
14
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
16
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
Get full text
Get full text
Get full text
Article -
17
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
18
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…Science and technology development has the tendency of learning from nature where human also try to develop artificial intelligent by imitating biological neuron network which is popularly termed Artificial Neural Network (ANN). …”
Get full text
Get full text
Get full text
Thesis -
19
Anomaly detection in network traffic using machine learning
Published 2026“…These findings demonstrate that machine learning techniques have strong potential to enhance network security by improving anomaly detection, providing a promising direction for developing intelligent, adaptive intrusion detection.…”
Get full text
Get full text
Get full text
Article -
20
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article
