Search Results - (( java application during algorithm ) OR ( basic operation machine algorithm ))

Refine Results
  1. 1

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…These issues consist of workload balancing among cells and operation issues such as machines assignment, inter/intra-cells material handling, workers assignment,subcontracting based on operational time, operation sequence of the parts and assessing effects of these parameters on cell design in dynamic environment. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Results of studying color segmentation using machine-learning algorithm and color space analysis is presented in this thesis. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…By the end of the research, graphs and animation system have done shown to demonstrate the basic operation of the enhance network with machine learning system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A new modern scheme for solving fractal–fractional differential equations based on deep feedforward neural network with multiple hidden layer by Admon, Mohd Rashid, Senu, Norazak, Ahmadian, Ali, Majid, Zanariah Abdul, Salahshour, Soheil

    Published 2024
    “…During the initial stage of the method development, the basic framework on solving FFDEs is designed. To minimize the burden of computational time, the vectorized algorithm is constructed at the next stage for method to be performed efficiently. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…More significantly, this paper empirically discusses and compares the performances of six supervised machine learning algorithms, known as K-Nearest Neighbors (K-NN), Decision Tree (DT), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB), and Logistic Regression (LR), which are commonly used in the literature for detecting malware apps.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Text-based emotion prediction system using machine learning approach by Ahmad Fakhri, Ab. Nasir, Eng, Seok Nee, Chun, Sern Choong, Ahmad Shahrizan, Abdul Ghani, Anwar, P. P. Abdul Majeed, Asrul, Adam, Mhd, Furqan

    Published 2020
    “…Therefore, four supervised machine learning classification algorithms such as Multinomial Naïve Bayes, Support Vector Machine, Decision Trees, and kNearest Neighbors were investigated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…It has been introduced by manufacturing that operated in Germany. This innovation of IT development changes from the manufacturing process that involved machine to digital automated production in the production line. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Review of deep convolution neural network in image classification by Al-Saffar, Ahmed Ali Mohammed, Tao, Hai, Mohammed, Ahmed Talab

    Published 2017
    “…This paper first introduces the rise and development of deep learning and convolution neural network, and summarizes the basic model structure, convolution feature extraction and pooling operation of convolution neural network. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Machining characteristics of hastelloy c-2000 in end milling using artificial intelligence approach by Nurul Hidayah, Razak

    Published 2012
    “…This research work deals with the machining characteristics of Hastelloy C-2000 in the end milling operations. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…The web camera is only operable with the web camera driver installed in the PC. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20