Search Results - (( system machine learning algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Phylogenetic tree classification system using machine learning algorithm by Tan, Jia Kae

    Published 2015
    “…A study is conducted to develop an automated phylogenetic tree image classification system by using machine learning algorithm. This study adopted supervised machine learning algorithm which is the Support Vector Machine (SVM) for classification. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    Mobile machine vision for railway surveillance system using deep learning algorithm by Kit, Guan Lim, Daniel Siruno, Min, Keng Tan, Chung, Fan Liau, Sha, Huang, Tze, Kenneth Kin Teo

    Published 2021
    “…In order to overcome this issue, machine vision embedded with deep learning algorithm can be implemented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Machine learning: tasks, modern day applications and challenges by Aljuaid, Lamyaa Zaed, Koh, Tieng Wei, Sharif, Khaironi Yatim

    Published 2019
    “…These machine learning algorithms are a collection of complex mathematical models and human intuitions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The aim of this paper to build a network anomaly detection system using machine learning algorithms that are efficient, effective and fast processing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Machine learning approach for automated optical inspection of electronic components by Lim, Siew Kee

    Published 2019
    “…The factor that affecting the confidence level of the supervised machine learning algorithm is discussed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The experiment is conducted for the datasets that obtained by using machine learning method. The results are obtained, showing the performance of machine learning method on each dataset.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…Machine Learning allows a system to learn gradually to improve its accuracy in predicting future outcome. …”
    Get full text
    Get full text
    Undergraduates Project Papers