Search Results - (( java data normalization algorithm ) OR ( program organization learning algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Current applications of machine learning in dentistry by Ghazali, Ahmad Badruddin, Reduwan, Nor Hidayah, Ibrahim, Roliana

    Published 2022
    “…ML programs can improve from experience automatically, unlike traditional computer programming, where every step of the program requires a written code (Mayo & Leung, 2018). …”
    Get full text
    Get full text
    Book Chapter
  8. 8

    Optimizing kindergarten schedule using : graph coloring / Nur Nabilah Salleh Muner by Salleh Muner, Nur Nabilah

    Published 2019
    “…A graph coloring method were used to develop the new schedule by considering the essential and preferential conditions provided by the organization. The greedy algorithm was used to color the graph and it was supported by the C++ program. …”
    Get full text
    Get full text
    Research Reports
  9. 9
  10. 10

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancing professional development and training through AI for personalized learning: a framework to engaging learners / Zoel-Fazlee Omar ... [et al.] by Omar, Zoel-Fazlee, Mior Harun, Mior Harris, Mohd Ishar, Nor Irvoni, Mustapha, Nur Arfah, Ismail, Zurina

    Published 2024
    “…This paper explores the transformative potential of AI-driven personalized learning in enhancing professional development and training programs. …”
    Get full text
    Get full text
    Article
  12. 12

    Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale by Ameenuddin Irfan, S., Fadhli, M.Z., Padmanabhan, E.

    Published 2021
    “…The application aims to develop a machine learning program using the algorithm of Support Vector Machine or Gaussian Process Regression to successfully predict the contact angle. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Multistage quality control in manufacturing process using blockchain with machine learning technique by Gu, J., Zhao, L., Yue, X., Arshad, N.I., Mohamad, U.H.

    Published 2023
    “…To this goal, a variety of machine learning algorithms are being studied. Data protection and monitoring is also another concern that is a critical component of the organization. …”
    Get full text
    Get full text
    Article
  14. 14

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…To dynamically control content, a Deep Q-Network (DQN)-based Reinforcement Learning (RL) engine moderates’ scenes using the cultural standards and the resilience in the viewership. …”
    Get full text
    Get full text
    Article
  15. 15

    Designing a New Model for Worm Response Using Security Metrics by Madihah Mohd Saudi, Taib, BM

    Published 2024
    “…In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. …”
    Proceedings Paper
  16. 16

    Analysis Of Human Detection Method In Social Distancing Monitoring by Nur Aina Syafinaz, Muhamad Atfan

    Published 2022
    “…The proposed method for human detection in social distancing monitoring is by using a deep learning algorithm which is You Only Look Once (YOLO) version 3 with custom datasets. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Ump Intelligent Chatbot Using Dialogflow by Joachim, Agostain

    Published 2022
    “…To create such a chatbot, a machine learning algorithm is used to learn the human language that is mainly used during such conversations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20