Search Results - (( java application learning algorithm ) OR ( its implementation some algorithm ))
Search alternatives:
- application learning »
- implementation some »
- learning algorithm »
- its implementation »
- java application »
- some algorithm »
-
1
-
2
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014“…Robot will be given some algorithm for certain task. In this project, we are going to build the cognitive mapping algorithm that can be implemented to the mobile robot. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
-
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…The result from this project is a data which is encrypted and be decrypted to its readable form. As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
7
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
9
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
10
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
12
Workability review of genetic algorithm approach in networks
Published 2014“…Generally, genetic algorithm process will accomplish according to its parameters sizes. …”
Get full text
Get full text
Conference or Workshop Item -
13
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…Therefore, optimizations are desirable especially when software implementation is preferred for its flexibility as compared to hardware implementation. …”
Get full text
Get full text
Thesis -
14
-
15
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…As a result, by using a trajectory set-point, some positive results is presented and discussed as the missile follow its reference trajectory via some simulation using MATLAB 7.0.…”
Get full text
Get full text
Conference or Workshop Item -
16
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This project will be using Latent Semantic Analysis Algorithm to cope with comparisons of khutbah texts as it’s cover most of the requirement of the system. …”
Get full text
Get full text
Thesis -
17
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. The results of False Matching Ratio (FMR) was 16.67% whilst the False Non-Matching Ratio (FNMR) was 33.33%. …”
Get full text
Get full text
Thesis -
18
Three-term backpropagation algorithm for classification problem
Published 2006“…Despite the general success of this algorithm, there are several drawbacks and limitations which some of them are the existence of local minima, slow rates of convergence and some of the modification of BP algorithm requires complex and costly calculations at each iteration, which offset their faster rates of convergence. …”
Get full text
Get full text
Thesis -
19
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
20
Designing an algorithm for bioloid humanoid navigating in its indoor environment
Published 2012“…Finally the performance of the system is analysed based on the elapsed time of the navigation action with the validation of optimal navigation strategy where the designed algorithm demonstrates the robustness of its implementation and execution. …”
Get full text
Get full text
Get full text
Article
