Search Results - (( java data normalization algorithm ) OR ( construct validation learning algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Reinforcement learning in risk management for pharmaceutical construction projects: frontiers, challenges, and improvement strategies by Junjia, Yin, Jiawen, Liu, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2025
    “…Therefore, this paper reviews the practical applications of six algorithms—Deep Q-Network (DQN), Deep Deterministic Policy Gradient (DDPG), and Proximity Policy Optimization (PPO)—in construction safety, temperature control, resource scheduling, and automated equipment optimization, validating the potential of reinforcement learning to effectively manage dynamic risks through adaptive learning. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Construction Noise Prediction Using Stochastic Deep Learning by Ooi, Wei Chien

    Published 2022
    “…The deep learning model was trained with stochastic data to predict the noise levels emitted from the construction site. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
    Get full text
    Get full text
    Article
  6. 6

    Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat by Chia , Yu Huat

    Published 2024
    “…Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. However, twin tunnel construction in urban areas commonly faces surface settlement (SS) issues, which threaten nearby structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Deep learning for EEG data analysis by Cheah, Kit Hwa

    Published 2018
    “…The convolutional neural network (CNN) model constructed in this project has achieved a validation accuracy of 75±1% using the same EEG dataset. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction by Hammid, Ali Thaeer, M. H., Sulaiman, Awad, Omar I.

    Published 2018
    “…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms by Nurellezia, Suleiman

    Published 2023
    “…The classifiers are validated and evaluated using accuracy, precision, recall, and f1-score along with 10-folds cross validation. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Polytechnic science lecturers’ intention to use ICT as a tool in northeast Nigeria: a smart PLS approach by Yohanna, G., Md Yunos, Jailani, Mohamad, Marlina, Ruth, J. Y.

    Published 2017
    “…Although the Nigerian government has provided computers for teaching and learning, they are underutilised. A survey was conducted to validate items recorded in past studies. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…From the construction of DuriO, 21 durian characteristics are produced in Webpage analysis phase. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article