Search Results - (( developing remote learning algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- learning algorithm »
- developing remote »
- validation using »
- java validation »
- using algorithm »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
Building detection using object-based Image analysis (OBIA) and machine learning (ML) algorithms / Hanani Mohd Shahar
Published 2020“…The information of building features especially in the urban area is very important to support urban management and development. Nevertheless, the automated and transferable detection of building features is still challenging because of variations of the spatial and spectral characteristics to support urban building classification using remote sensing techniques. …”
Get full text
Get full text
Thesis -
3
Face recognition for remote database backup system
Published 2011“…Neural Networks technique, specifically Multilayer Perceptron (MLP) model with Back-Propagation learning algorithm and Template Matching approach are implemented in model developed.The face recognition model developed is then applied on a remote database backup system.Template matching approach is found to give a higher percentage of matching accuracy and a faster result can be obtained compared to MLP as no learning process is required…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
Get full text
Get full text
Student Project -
5
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Design and implementation of a deep learning based hand gesture recognition system for Rehabilitation Internet-Of-Things (RIOT) environments using MediaPipe
Published 2025“…Several limitations, including latency and distance sensitivity, are addressed in this system with edge computing alongside adaptive algorithms. The key contributions of this research are as follows: First, developing a real-time and cost-effective solution for remote stroke rehabilitation. …”
Get full text
Get full text
Get full text
Article -
7
The impact of virtual reality on programming algorithm courses on student learning outcomes
Published 2024“…The low learning outcomes of students and the limitations of learning media provide opportunities to develop innovations that can increase student engagement. …”
Get full text
Get full text
Get full text
Article -
8
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
9
A review of Convolutional Neural Networks in Remote Sensing Image
Published 2019“…Recently, convolutional neural network based deep learning algorithm has achieved a series of breakthrough research results in the fields of objective detection, image semantic segmentation and image classification, etc. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Home intruder detection system using machine learning and IoT
Published 2022Get full text
Get full text
Get full text
Article -
11
Advances in remote sensing technology, machine learning and deep learning for marine oil spill detection, prediction and vulnerability assessment
Published 2020“…On the other hand, deep learning modelsâ�� strong feature extraction and autonomous learning capability enhance their detection accuracy. …”
Get full text
Get full text
Article -
12
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
-
15
A comprehensive review of crop yield prediction using machine learning approaches with special emphasis on palm oil yield prediction
Published 2021“…Due to this developing significance of crop yield prediction, this article provides an exhaustive review on the use of machine learning algorithms to predict crop yield with special emphasis on palm oil yield prediction. …”
Get full text
Get full text
Get full text
Article -
16
A novel deep learning instance segmentation model for automated marine oil spill detection
Published 2020“…So far, detection and discrimination of oil spill and look-alike are still limited to the use of traditional machine learning algorithms and semantic segmentation deep learning models with limited accuracy. …”
Get full text
Get full text
Article -
17
A novel deep learning instance segmentation model for automated marine oil spill detection
Published 2020“…So far, detection and discrimination of oil spill and look-alike are still limited to the use of traditional machine learning algorithms and semantic segmentation deep learning models with limited accuracy. …”
Get full text
Get full text
Article -
18
Development of water surface robot system for lake sanitation and sampling / Ahmed Abdullah Omar
Published 2022“…The dissertation proposes three objectives; to design and develop the water surface robot structure, control and electronics, design and develop the APIs for remote robot connection, data communication and positioning, and evaluate the robot’s performance through case studies. …”
Get full text
Get full text
Get full text
Thesis -
19
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
20
