Search Results - (( developing notes learning algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…In this study, we evaluate the effectiveness of six supervised machine learning algorithms—K-Nearest Neighbor, Decision Trees, Support Vector Machine, Random Forests, Logistic Regression, and Naive Bayes—in detecting the authenticity of banknotes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Transfer Learning for Lung Nodules Classification with CNN and Random Forest by Abdulrazak, Saleh, Chee, Ka Chin, Ros Ameera, Rosdi

    Published 2023
    “…This research aims include preprocessing lung nodular data, developing the proposed algorithm, and comparing its effectiveness with other methods. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Transfer Learning for Lung Nodules Classification with CNN and Random Forest by Abdulrazak Yahya, Saleh, Chee, Ka Chin, Ros Ameera, Rosdi

    Published 2024
    “…This research aims include preprocessing lung nodular data, developing the proposed algorithm, and comparing its effectiveness with other methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhanced notes capture using super resolution technique on tecogan by Lee, Theresa Wen Yan

    Published 2023
    “…The concept is similar to documents scanning using mobile devices which users are able to capture the messages on the whiteboard, screen and notebook, then images can be further saved as enhanced notes in a softcopy file. The study areas included machine learning as well as generative adversarial network (GAN). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9

    Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal by Camellia , Mohd Kamal

    Published 2004
    “…The demonstration module provides the users only with the important notes that the user must know because the explanation already described in learning modules. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Lung Nodules Classification Using Convolutional Neural Network with Transfer Learning by Abdulrazak Yahya, Saleh, Ros Ameera, Rosdi

    Published 2023
    “…The objectives of this study are to pre-process lung nodules data, develop a CNN with transfer learning algorithm, and analyse the effectiveness of CNN with transfer learning compared to standard of other methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding
  12. 12

    Model rangkaian neural bagi penentuan gaya pembelajaran pelajar berasaskan model Felder-Silverman by Mohd Faisal Ibrahim, Fatimah Az Zahra Azizan, Mohd Saiful Dzulkefly Zan

    Published 2022
    “…These neural network models have been trained using records of how often a student visits learning content such as lecture notes, learning videos, teaching slides and online exercises. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Decision Support Tools: Machine Learning Application in Smart Planner by Baharom, M.A.A., Rahman, M.S.A., Sabudin, A.R., Nor, M.F.M.

    Published 2023
    “…Immaculate Project Planning and Execution (PPE) is capital to edge over competitors, decrease costs and honour delivery dates.Project Management Information System (PMIS) is necessary towards an improved and efficient quality of any project.Machine Learning (ML) Algorithms enabled learned the date of experience to develop insights into various associations between data and outcomes.A defined set of rules prescribed by the analysts makes the probability of the fault possible.In this paper, Regression Model compute across all viable sectors expending the tool for Downstream Business and other Facilities Upstream, including Resource Estimation Schedule Generation.Extending structured information into a reliable database allows super users to define the data structures and completely configurable the settingâ��s dynamics.The model used to decrease the approximation error and measure the closest possible outcome.This subset of artificial intelligence has tremendous potential in improving schedule generation configuration to develop Project Planning timely and financially smartly.This paper aims to share standard protocols and methods applied in ML-aided as a tool in PPE decision making.Additionally, the abundant used data resources devoted to implementing ML are outlined.Finally, ML success as a Decision Support tool in project management by having a Smart Planner in supporting project recommendation accelerates the decision process, increases stakeholder confidence, and minimizes uncertainty; results are reviewed and analyzed where gaps and potential improvement for future projects are being noted and highlighted. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…Many test data generation strategies based on meta-heuristic algorithms such as Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search (HS), Cuckoo Search (CS), Bat Algorithm (BA) and Bees Algorithm have been developed in recent years. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Bio-inspired for Features Optimization and Malware Detection by Razak, Mohd Faizal Ab, Anuar, Nor Badrul, Othman, Fazidah, Firdaus, Ahmad, Afifi, Firdaus, Salleh, Rosli

    Published 2018
    “…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
    Get full text
    Get full text
    Article