Search Results - (( pattern mobile learning algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition by M. A., Ameedeen, Marhaini, M. S.

    Published 2016
    “…The ELM algorithm will be applied to an ultra-mobile Near Infrared (NIR) spectrometer. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir by Amir, Nur Hazirah

    Published 2019
    “…With this project creates a mobile app that analyse the mood pattern which also correspond with menstrual cycle to be able to predict mood. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…The performance of MANFIE was compared with existing methods in a diversity of practical benchmark applications such as pattern classifications, time series predictions, modeling with inverse learning control and mobile robot navigation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali by Sazali, Harizah

    Published 2006
    “…Based on the experiment results, it is proved that content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
    Get full text
    Get full text
    Student Project
  5. 5

    Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques by Ng, Jiun Shen

    Published 2022
    “…This project is about predicting energy consumption patterns based on trending videos on YouTube 2021 by using machine learning techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A lightweight graph-based pattern recognition scheme in mobile ad hoc networks. by Raja Mahmood, Raja Azlina, Muhamad Amin, Anang Hudaya, Amir, Amiza, Khan, Asad I.

    Published 2012
    “…A lightweight, low-computation, distributed intrusion detection scheme termed the distributed hierarchical graph neuron (DHGN) was proposed to be incorporated into a cooperative intrusion detection system (IDS) in mobile ad hoc networks (MANETs). Its one-cycle learning and divide and distribute recognition task approach allows DHGN to detect similar patterns in short of time. …”
    Get full text
    Book Section
  7. 7
  8. 8

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11

    An integrated priority-based cell attenuation model for dynamic cell sizing by Amphawan, Angela, Omar, Mohd Nizam, Din, Roshidi

    Published 2012
    “…Real-time predicted mobile traffic from the EFuNN structure was used to control the size of all the cells.Results obtained demonstrate the robustness of the integrated module in recognizing the temporal pattern of the mobile traffic and dynamically controlling the cell size in order to reduce the number of calls dropped.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…Hagras et al. formulated Fuzzy-Genetic technique to adapt the learning behaviour of an autonomous mobile robot in unstructured and changing environments.…”
    Get full text
    Get full text
    Thesis
  13. 13

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…That adopts machine learning techniques to classify botware and benign applications. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Generation of synthetic 5G network dataset using Generative Adversarial Network (GAN) by Azman, Muhammad Amin, Abu-samah, Asma, Khatiman, Muhammad Nur Aqmal, Nordin, Rosdiadee, Abdullah, Nor Fadzilah

    Published 2024
    “…Nevertheless, the models based on AI/ML need a sufficient amount of data for learning patterns and relationships, enabling them to provide precise predictions for unfamiliar data and situations. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Al-Garadi, Mohammed Ali

    Published 2019
    “…Recently, deep learning algorithms for automatic feature representation have also been proposed to lessen the burden of reliance on handcrafted features and to increase performance accuracy. …”
    Get full text
    Get full text
    Article
  20. 20

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…Businesses have adopted certain algorithms that can help them to extract information from the Internet to discover potentially significant patterns inherent in the database, which can help the online marketing strategy. …”
    Get full text
    Get full text
    Conference or Workshop Item