Search Results - (( java implementation plan algorithm ) OR ( using users learning algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…GA assists in optimizing the search process and performs machine learning. Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
    Conference paper
  5. 5

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…This spam message includes the email and the SMS message that received by the user. There are several algorithms that can be used in the machine learning method to prevent the both attacks. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    An adaptive HMM based approach for improving e-Learning methods by Deeb B., Hassan Z., Beseiso M.

    Published 2023
    “…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
    Conference Paper
  13. 13

    Estimating Depressive Tendencies Of Twitter User Via Social Media Data by Loh, Hooi Teng

    Published 2023
    “…We will use these three machine learning algorithms to compare the accuracy and performance of the depressed twitter user. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Predicting user trajectories using deep learning algorithms / Ahmad Zaki Aiman Abdul Rashid, Azita Laily Yusof and Norsuzila Ya’acob by Abdul Rashid, Ahmad Zaki Aiman, Yusof, Azita Laily, Ya’acob, Norsuzila

    Published 2025
    “…Due to this, this paper predicts user’s future trajectory from past trajectory utilizing deep learning (DL) algorithms which are Long-Short Term Memory (LSTM), BiDirectional LSTM, and Gated Recurrent Unit (GRU). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  17. 17

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…History is one of the school subjects in Malaysian schools and known as a compulsory subject that is required to pass the SPM examination. One of the main learning methods in Malaysian education is by using textbooks as it is a universal formal school learning material and a dominant resource of learning. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Applying learning to filter text by Sainin, Mohd Shamrie

    Published 2005
    “…Text filtering has been a successful application especially in e-mail filtering. The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…Simulation results demonstrate improved performance in power consumption, load, sum rate, utility, learning rate, convergence, and energy efficiency for small base stations (SBSs) and user equipment (UEs) compared to four benchmarked algorithms, including WMMSE, game theory, Q-learning, and DRL. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multilingual Ontology Learning Algorithm for Emails by Beseiso M., Ahmad A.R., Ismail R., Taher M.

    Published 2023
    “…In this research, we have explained the necessity for utilizing multilingual ontology learning processes to solve this problem. We have proposed the multilingual ontology learning algorithm for semantic email. …”
    Conference paper