Search Results - (( developing mobile normalization algorithm ) OR ( java learning classification algorithm ))
Search alternatives:
- normalization algorithm »
- mobile normalization »
- java learning »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
3
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
4
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
5
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024Conference Paper -
6
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
8
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Currently, normal SMS using GSM communication is not secured and safe enough. …”
Get full text
Get full text
Conference or Workshop Item -
10
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…This research proposes and develops a multi-display data visualisation algorithm using mobile augmented reality, as augmented reality (AR) is beyond the two-dimensional screen. …”
Get full text
Get full text
Get full text
Article -
11
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The first algorithm DCFP outperforms the NCPR algorithm in terms of normalize routing overhead by 11.27%, while maintaining the same packet delivery ratio. …”
Get full text
Get full text
Get full text
Thesis -
12
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Computing non-contactable drowsiness monitoring system with mobile machine vision
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Therefore, a new technique and algorithm were developed to resolve the image scale uncertainty. …”
Get full text
Get full text
Thesis -
18
-
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
20
