Search Results - (( process learning programmes algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…TRAKLA2 is a visualisation tool used to enhance the process of learning algorithm construction and optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Various algorithms are designed, formulated and computed in MATLAB and then embedded to a real-time programmable microcontroller. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A step towards the development of VHDL model for ANN based EMG signal classifier by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2012
    “…A feed-forward ANN with back-propagation learning algorithm is used for the classification of EMG signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Evaluating the performances of Dice, Jaccard, Overlap, and Cosine coefficients in automated marking of algebraic equations / Hasnah Yusof, Wan Rolini Wan Yusoff and Masita Jamal by Yusof, Hasnah, Wan Yusoff, Wan Rolini, Jamal, Masita

    Published 2006
    “…Computers enable the automation of many tasks and made great contributions in many areas where learning process takes place. Assessment plays an important role in the learning process of many courses and mathematics is no exception. …”
    Get full text
    Get full text
    Research Reports
  9. 9
  10. 10
  11. 11

    Computerised Heuristic Algorithm for Multi-location Lecture Timetabling by Kuan, Huiggy

    Published 2020
    “…A two-stage heuristic algorithm is proposed to solve the multi-location timetabling problem on MSc HRD coursework programme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…The main intend of the system was to verify if the marking can be read by humans. Algorithms that the current process uses however, was not capable in handling mark variations that was introduced by the marking process. …”
    Get full text
    Get full text
    Thesis
  13. 13

    CT-eKit: computational thinking interactive learning / Ong Sing Ling, Jill Ling and Fetylyana Nor Pazilah by Ong, Sing Ling, Jill, Ling, Pazilah, Fetylyana Nor

    Published 2023
    “…Hence, this innovation aims to innovate a CTeKit, a collective teaching aid that emphasises Inquiry-based learning (IBL), developed to facilitate the learning process on the CT topic. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Ensemble learning for multidimensional poverty classification by Azuraliza Abu Bakar, Rusnita Hamdan, Nor Samsiah Sani

    Published 2020
    “…CRoss Industry Standard Process for Data Mining (CRISP-DM) methods was used to ensure data mining and ML processes were conducted properly. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…Kinaesthetic students process new knowledge (or understanding) with the involvement of their body movement. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…As a result, although customers may receive an excellent interactive features programme, the backend algorithm is not optimized. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Artificial Intelligence (AI) to predict dental student academic performance based on pre university results by Abdullah, Adilah Syahirah, Ahmad Amin, Afifah Munirah, Lestari, Widya, Sukotjo, Cortino, Utomo, Chandra Prasetyo, Ismail, Azlini

    Published 2021
    “…This study aims to predict the academic performance of dental students based on their admission results using Artificial Intelligence. Machine Learning Algorithm is applied using academic result samples of graduates of the Kulliyyah of Dentistry, IIUM from 2016-2021. …”
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis