Search Results - (( filing implementation force algorithm ) OR ( java visualization learning algorithm ))
Search alternatives:
- visualization learning »
- filing implementation »
- implementation force »
- java visualization »
- learning algorithm »
- force algorithm »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
2
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…But committing to memory such strong passwords can prove to be quite a daunting task thus forcing users to resort to writing them down on pieces of papers or even storing them onto a computer file. …”
Get full text
Get full text
Get full text
Article -
4
Potential field methods and their inherent approaches for path planning
Published 2016“…Two type of forces involved in potential field method; attractive force generated by goals and repulsive force generated by obstacles. …”
Get full text
Get full text
Article -
5
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
6
The quadriceps muscle of knee joint modelling using neural network approach: Part 2
Published 2017“…— Artificial neural network has been implemented in many filed, and one of the most famous estimators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
Get full text
Get full text
Thesis
