Search Results - (( java application customization algorithm ) OR ( software active learning algorithm ))
Search alternatives:
- customization algorithm »
- learning algorithm »
- java application »
- software active »
- active learning »
-
1
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…The new control scheme named active force control with iterative learning control algorithm (AFCIL) is complemented by the classic proportionalintegral-derivative (PID) control incorporated and designed as the outermost control loop. …”
Get full text
Get full text
Thesis -
3
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of learning algorithm of passive joint for 3R under-actuated robot / Mohd Amiruddin Fikri Yaakob
Published 2015“…The approach embedded Artificial Neural Network (ANN) algorithm and SIMULINK block diagram. Experiments were conducted to predict an algorithm on position angle measurement either SIMULINK block diagram or program code method applied to three joints; Active 1, Active 2 and Passive respectively. …”
Get full text
Get full text
Thesis -
5
-
6
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021Get full text
Get full text
Conference or Workshop Item -
7
Enhancing understanding of programming concepts through physical games
Published 2017“…There are many approaches in teaching programming such as through application software on line and offline, through software application games) and physical activities such as board games, dancing and computational thinking activities. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Adaptive approach in handling human inactivity in computer power management
Published 2016“…This study introduces Control, Learn and Knowledge model that adapts the Monitor, Analyze, Planning, Execute control loop integrates with Q Learning algorithm to learn human inactivity period to minimize the computer power consumption.An experiment to evaluate this model was conducted using three case studies with same activities. …”
Get full text
Get full text
Get full text
Article -
10
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…The result of this study shows that students could understand the concepts of algorithms taught and did not require recovery activities. …”
Get full text
Get full text
Get full text
Article -
11
Machine learning algorithms for early predicting dropout student online learning
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…The result of this study shows that students could understand the concepts of algorithms taught and did not require recovery activities. …”
Get full text
Get full text
Get full text
Article -
13
Stimulus-stimulus association via reinforcement learning in spiking neural network
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…The most widespread type of malicious software that discreetly monitors user activities and logs keystrokes is called keylogging malware. …”
Get full text
Get full text
Student Project -
16
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Unsupervised learning, also known as unsupervised machine learning, analyzes and clusters unlabeled data utlizing machine learning techniques. …”
Get full text
Get full text
Article -
17
-
18
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Improving modified cocomo ii artificial neural network using hyperbolic tangent activation function
Published 2017“…Software cost estimation is a complex and critical issue in software industry but it is an inevitable activity in the software development process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis
