Search Results - (( features expansion function algorithm ) OR ( java implementation phase algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- features expansion »
- function algorithm »
- phase algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Modern fuzzy min max neural networks for pattern classification
Published 2019“…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
Get full text
Get full text
Thesis -
3
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
4
An Education-Based System for Two-Way Translations of Sign Language
Published 2025“…To enhance the system's functionality, future work could focus on continuous signing, dataset expansion, and adaptive learning. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
Published 2021“…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
Published 2021“…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
Get full text
Get full text
Get full text
Get full text
Article
