Search Results - (( developing table learning algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Development of a diversified ensemble data summarization (DDS) tool for learning medical data in a multi relational environment by Rayner Alfred, Leau, Yu Beng, Tan, Soo Fun

    Published 2012
    “…A diversified data summarization ensemble method is best applied in the task of learning data stored in multiple tables since ensemble methods improve quality and robustness of the results. …”
    Get full text
    Get full text
    Research Report
  2. 2

    Development of a syncope classification algorithm from physiological signals acquired in tilt-table test by Gan, Ming Hong

    Published 2023
    “…Syncope also known as transient loss of consciousness which caused problem to human daily life. Since machine learning is much more advanced, classification of syncope can be done with machine learning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…A novel investigation in modelling of groundwater level and quality using Artificial Neural Networks (ANNs) and Adaptive neuro fuzzy inference systems (ANFIS) methods was developed in the study area. Water table modelling based on ANNs and ANFIS technology were developed to simulate the water table fluctuations based on the relationship between the variations of rainfall, humidity, evaporation, minimum and maximum temperature and water table depth. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Deep reinforcement learning to multi-agent deep reinforcement learning by Samieiyeganeh, Mehdi, O. K. Rahmat, Rahmita Wirza, Khalid, Fatimah, Kasmiran, Khairul Azhar

    Published 2022
    “…In the third section, we look at the RL and important algorithms that exist in this area. In the fourth section, we study DRL and explain the reasons for which different algorithms have been developed in this regard. …”
    Get full text
    Get full text
    Article
  5. 5

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Evaluation of arima and ann stream analytics for air quality monitoring system by Nurmadiha, Osman

    Published 2021
    “…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Prediction of oil and gas pipeline failures through machine learning approaches: A systematic review by Al-Sabaeei, A.M., Alhussian, H., Abdulkadir, S.J., Jagadeesh, A.

    Published 2023
    “…The rapid progress of machine learning (ML) technologies provides an advantageous opportunity to develop predictive models that can effectively tackle these challenges. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Diamond price prediction using random forest algorithm / Nur Amirah Mohd Azmi by Mohd Azmi, Nur Amirah

    Published 2025
    “…This project addresses the challenge of accurately pricing diamonds by leveraging machine learning techniques. Diamonds are priced based on various attributes such as carat, cut, color, clarity, depth, and table, which exhibit complex interrelationships. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Optimisation and control of fed-batch yeast production using q-learning by Helen, Chuo Sin Ee

    Published 2013
    “…QLE signifies the importance of exploration from time to time based on the developed “past experience” in Q-table to optimise the process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things by Rahim Khan, Abdullah Ghani, Samia Allaoua Chelloug, Mohammed Amin, Aamir Saeed, Jason Teo

    Published 2023
    “…Furthermore, the machine learning approach helps enable these devices to update their routing tables simultaneously, and an optimal path could be replaced if a better one is available. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20