Search Results - (( processes active learning algorithm ) OR ( java application design algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  5. 5

    The effect of adaptive parameters on the performance of back propagation by Abdul Hamid, Norhamreeza

    Published 2012
    “…The results show that the proposed algorithm extensively improves the learning process of conventional Back Propagation algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Modeling the prediction of hydrogen production by co-gasification of plastic and rubber wastes using machine learning algorithms by Ayodele B.V., Mustapa S.I., Kanthasamy R., Zwawi M., Cheng C.K.

    Published 2023
    “…Chemical activation; Gasification; Learning algorithms; Machine learning; Multilayer neural networks; Neurons; Plastics industry; Predictive analytics; Rubber; Rubber industry; Activation functions; MLP neural networks; Model architecture; Multi layer perceptron; Neural network algorithm; Optimized performance; Process operation; Radial Basis Function(RBF); Hydrogen production…”
    Article
  8. 8

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9
  10. 10
  11. 11
  12. 12

    Underwater Image Recognition using Machine Learning by Divya, N.K., Manjula, Sanjay Koti, Priyadarshini, S

    Published 2024
    “…A Convolutional Neural Network (CNN) is a type of a deep learned an algorithm that has been created for image processing when using convolutional layers to automatically and in a hierarchical way learn features from the input images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Interactive framework for dynamic modelling and active vibration control of flexible structures by Mat Darus, Intan Zaurah, Mohd. Hashim, Siti Zaiton, Tokhi, M. O.

    Published 2008
    “…This paper presents the implementation of an interactive learning environment for dynamic simulation and active vibration control of flexible structures. …”
    Get full text
    Get full text
    Article
  15. 15

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
    Get full text
    Get full text
    Article
  17. 17

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20