Search Results - (( java implementation bat algorithm ) OR ( using users learning algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…GA assists in optimizing the search process and performs machine learning. Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
    Conference paper
  3. 3

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    An adaptive HMM based approach for improving e-Learning methods by Deeb B., Hassan Z., Beseiso M.

    Published 2023
    “…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
    Conference Paper
  7. 7

    Estimating Depressive Tendencies Of Twitter User Via Social Media Data by Loh, Hooi Teng

    Published 2023
    “…We will use these three machine learning algorithms to compare the accuracy and performance of the depressed twitter user. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Predicting user trajectories using deep learning algorithms / Ahmad Zaki Aiman Abdul Rashid, Azita Laily Yusof and Norsuzila Ya’acob by Abdul Rashid, Ahmad Zaki Aiman, Yusof, Azita Laily, Ya’acob, Norsuzila

    Published 2025
    “…Due to this, this paper predicts user’s future trajectory from past trajectory utilizing deep learning (DL) algorithms which are Long-Short Term Memory (LSTM), BiDirectional LSTM, and Gated Recurrent Unit (GRU). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  11. 11

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…History is one of the school subjects in Malaysian schools and known as a compulsory subject that is required to pass the SPM examination. One of the main learning methods in Malaysian education is by using textbooks as it is a universal formal school learning material and a dominant resource of learning. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Applying learning to filter text by Sainin, Mohd Shamrie

    Published 2005
    “…Text filtering has been a successful application especially in e-mail filtering. The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…Simulation results demonstrate improved performance in power consumption, load, sum rate, utility, learning rate, convergence, and energy efficiency for small base stations (SBSs) and user equipment (UEs) compared to four benchmarked algorithms, including WMMSE, game theory, Q-learning, and DRL. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multilingual Ontology Learning Algorithm for Emails by Beseiso M., Ahmad A.R., Ismail R., Taher M.

    Published 2023
    “…In this research, we have explained the necessity for utilizing multilingual ontology learning processes to solve this problem. We have proposed the multilingual ontology learning algorithm for semantic email. …”
    Conference paper
  15. 15
  16. 16
  17. 17

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…The usefulness of using the user's tweet to measure depression studies using a literature review. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…It is intended that this initiative would deliver benefits to all of the users and be useful to them.…”
    Get full text
    Get full text
    Student Project
  19. 19

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20