Search Results - (( java implementation during algorithm ) OR ( using table learning algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- learning algorithm »
- during algorithm »
- table learning »
- using table »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Development of a diversified ensemble data summarization (DDS) tool for learning medical data in a multi relational environment
Published 2012“…This can be achieved by summarizing each table that exists in the database by using a more appropriate data summarization method depending on the type of data stored in each individual table. …”
Get full text
Get full text
Research Report -
3
An evolutionary based features construction methods for data summarization approach
Published 2015“…The DARA algorithm will be applied to summarize data stored in the non-target tables by clustering them into groups, where multiple records stored in nontarget tables correspond to a single record i,tored in a target table. …”
Get full text
Get full text
Research Report -
4
-
5
Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization
Published 2023“…Using a Q-learning table, QL-NMR remembers the historical performance of each chaotic map during the S-box construction process allowing just-in-time adaptive selection based on its current performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
7
Deep reinforcement learning to multi-agent deep reinforcement learning
Published 2022“…In fact, overall goal in this paper is a comprehensive explanation of the various Deep Reinforcement Learning (DRL) algorithms, and its combination with Multi-Agent methods. …”
Get full text
Get full text
Article -
8
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
Get full text
Get full text
Thesis -
9
Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review
Published 2024“…The aims of the study were to systematically evaluate available machine learning (ML) algorithm for supporting syncope diagnosis to determine their performance compared to existing point scoring protocols. …”
Get full text
Get full text
Article -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…The training phase of the machine learning algorithm used proposed real-time training datasets benchmarked with two training datasets from CICIDS and NSL-KDD. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
14
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. The proposed approaches take the advantages of structured peer-to-peer systems where the contents of peers’ caches are shared using Distributed Hash Table (DHT) in order to enhance the performance of the web caching policy. …”
Get full text
Get full text
Get full text
Article -
15
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
16
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm’s performance is illustrated by the corresponding table of the classification rate. …”
Get full text
Get full text
Conference or Workshop Item -
17
Prediction of oil and gas pipeline failures through machine learning approaches: A systematic review
Published 2023“…It also provides in-depth details, summarized in tables, on different failure types, commonly used ML algorithms, and data resources, with critical discussions. …”
Get full text
Get full text
Article -
18
The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip
Published 2015“…The problems are the pupils not memorized the multiplication tables, error in terms of algorithms, especially involving multiplication of whole numbers with two-digit numbers and errors involving regrouping the product of the multiplication. …”
Get full text
Get full text
Thesis -
19
Automatic personalized student timetable / Siti Aishah Mohamed Amin
Published 2010Get full text
Get full text
Thesis -
20
Fuzzy rules reduction using rough set approach
Published 2003“…Johnson reducer and Genetic Algorithm reducer are the methods used for computing reducts. …”
Get full text
Conference or Workshop Item
