Search Results - (( java application customization algorithm ) OR ( construct application learning algorithm ))

Refine Results
  1. 1
  2. 2

    Reinforcement learning in risk management for pharmaceutical construction projects: frontiers, challenges, and improvement strategies by Junjia, Yin, Jiawen, Liu, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2025
    “…Therefore, this paper reviews the practical applications of six algorithms—Deep Q-Network (DQN), Deep Deterministic Policy Gradient (DDPG), and Proximity Policy Optimization (PPO)—in construction safety, temperature control, resource scheduling, and automated equipment optimization, validating the potential of reinforcement learning to effectively manage dynamic risks through adaptive learning. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
    Get full text
    Get full text
    Research Report
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A Conceptual Framework to Aid Attribute Selection in Machine Learning Student Performance Prediction Models by Khan I., Ahmad A.R., Jabeur N., Mahdi M.N.

    Published 2023
    “…However, numerous barriers exist while developing and implementing such kind of learning analytics applications. Machine learning algorithms emerge as useful tools to endorse learning analytics by building models capable of forecasting the final outcome of students based on their available attributes. …”
    Article
  16. 16

    Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao by He , Biao

    Published 2024
    “…Its ability of continual learning is highly applicable to actual tunnel blasting cases. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition by Ali Yahya, Anwar

    Published 2007
    “…Motivating by these drawbacks, this research proposes a new model of dialogue act recognition in which dynamic Bayesian machine learning is applied to induce dynamic Bayesian networks models from task-oriented dialogue corpus using sets of lexical cues selected automatically by means of new variable length genetic algorithm. …”
    Get full text
    Get full text
    Thesis