Search Results - (( java _ machine algorithm ) OR ( program visualisation using algorithm ))
Search alternatives:
- program visualisation »
- visualisation using »
- machine algorithm »
- using algorithm »
-
1
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
Get full text
Get full text
Get full text
Article -
2
The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study
Published 2026“…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…These chatbots acquired its intelligence through a hybrid approach that combines pattern-matching technique and machine learning algorithm in order to formulate its responses. …”
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
5
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006Get full text
Get full text
Thesis -
8
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
9
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. …”
Get full text
Get full text
Get full text
Article -
10
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…In this paper, the stacking ensemble method is used to increase the accuracy of the machine learning model for LSM where the base (first-level) learners use five ML algorithms namely decision tree (DT), k-nearest neighbor (KNN), AdaBoost, extreme gradient boosting (XGB) and random forest (RF). …”
Conference Paper -
11
-
12
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
Get full text
Get full text
Get full text
Article -
13
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. …”
Get full text
Get full text
Get full text
Article -
14
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
15
Biometrics electronic purse
Published 1999“…A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…This application, integrated with a predictive model, offers real-time visualisation of primary cooling system characteristics through handheld devices. …”
Get full text
Get full text
Thesis -
17
Examination timetabling usinggenetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
18
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
FBGA-based implementation of electronic abacus using altera DE2 board
Published 2017“…The development of electronic abacus is to integrate the use of abacus along with electronic devices which offers better visualisation of the abacus operations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000Get full text
Get full text
Thesis
