Search Results - (( policy implementation learning algorithm ) OR ( java data visualization algorithm ))

Refine Results
  1. 1

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  5. 5

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This work employed the use of machine learning approach. Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Poverty risk prediction based on socioeconomic factors using machine learning approach by Mohd Zawari, Nur Farhana Adibah

    Published 2025
    “…Although the research is limited with respect to its sample size and geographical scope, it has provided important findings that can be used when implementing data-driven methods in social policy formulation and poverty mitigation strategies.…”
    Get full text
    Get full text
    Student Project
  11. 11

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  12. 12

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…As a result, the simulation environment makes it possible to collect massive training datasets. Improving learning driving policies can be adopted fast in the actual world. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Ethical considerations for equitable outcome-based education in the Metaverse: a qualitative study by Mohamed Sofiadin, Aidrina

    Published 2025
    “…Semi-structured interviews were conducted with 11 XR experts across education, design, and policy domains. Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Emotion recognition and analysis of netizens based on micro-blog during covid-19 epidemic by Jiao, BianBian, Leelavathi, R., Lohgheswary, N., Nopiah, Z. M.

    Published 2022
    “…It will be of great significance for the introduction and implementation of national policies.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of PPO and SAC Algorithms towards decision making strategies for collision avoidance among multiple autonomous vehicles by Abu Jafar, Md Muzahid, Syafiq Fauzi, Kamarulzaman, Md Arafatur, Rahman

    Published 2021
    “…In order to address this challenge, a simulation was implemented in the Unity3D game engine and two state-of-the-art RL algorithms PPO (Proximal Policy Optimization) and SAC (Soft Actor-Critic) were trained by an agent using Unity ML-Agents Toolkit. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024) by Ibrahim Brian, Muhammad Shyazzwan

    Published 2025
    “…This model serves as a practical guide for educators and stakeholders aiming to implement AI-enhanced pedagogies responsibly. Ultimately, the study underscores the need for interdisciplinary collaboration among educators, policymakers, and technology developers to foster sustainable and inclusive learning environments. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Poverty Classification in Indonesia Using BiGRU, BPNN, and Stacking AdaBoost Frameworks by Khalisha, Ariyani, Silvia, Ratna, M., Muflih, Haldi, Budiman, Noor, Azijah, M.Rezqy, Noor Ridha

    Published 2024
    “…These findings underscore the critical role of machine learning in formulating effective policies for poverty alleviation and suggest that integrating multiple machine learning algorithm can significantly enhance decision-making processes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Flow-based approach on bro intrusion detection by Alaidaros, Hashem, Mahmuddin, Massudi

    Published 2017
    “…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
    Get full text
    Get full text
    Get full text
    Article