Search Results - (( user active learning algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- learning algorithm »
- implication based »
- java implication »
- active learning »
- user active »
-
1
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Interactive framework for dynamic modelling and active vibration control of flexible structures
Published 2008“…The environment, thus developed, forms a useful interactive and user-friendly learning and education facility.…”
Get full text
Get full text
Article -
3
Enhanced human activity recognition framework for wearable devices based on explainable AI
Published 2024“…However,Many users and developers do not fully comprehend deep learning and other algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
6
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
Get full text
Get full text
Undergraduates Project Papers -
7
An adaptive HMM based approach for improving e-Learning methods
Published 2023“…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
Conference Paper -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
9
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
10
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…The most widespread type of malicious software that discreetly monitors user activities and logs keystrokes is called keylogging malware. …”
Get full text
Get full text
Student Project -
11
Stock indicator scanner customization tool using deep reinforcement learning
Published 2022“…The stock indicators selected by user will be the input of DQN algorithm and act as state while the actions allowed for the DQN agent will be buy and sell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Adaptive approach in handling human inactivity in computer power management
Published 2016“…This study introduces Control, Learn and Knowledge model that adapts the Monitor, Analyze, Planning, Execute control loop integrates with Q Learning algorithm to learn human inactivity period to minimize the computer power consumption.An experiment to evaluate this model was conducted using three case studies with same activities. …”
Get full text
Get full text
Get full text
Article -
13
StockMaster simulator / Nor Hamiza Mohd Noor ... [et al.]
Published 2023“…Apart from helping users learn about handling stocks and investments, it is also a risk-free practice that can improve investor skills. …”
Get full text
Get full text
Book Section -
14
Algorithm visualization design guidelines for mobile leaning
Published 2018“…Consequently, this study primarily proposes the design guidelines of AV mobile learning that integrates those two aspects. The guidelines are established through systematic activities: analytical review from various related fields. …”
Get full text
Get full text
Get full text
Article -
15
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…An effective machine learning approach created from a separate examination of many machine learning algorithms in WEKA should be applied for the correct identification of heart disease. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…However, this has exposed to the malicious activities and online threat to the users which will disrupt the method of every system and performance. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Visualization Tool for Pathfinding Algorithms
Published 2023“…By incorporating interactive features and step-by-step animations of popular pathfinding algorithms, the tool empowers students to actively engage in the learning process and experiment with different algorithmic approaches. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023“…The activity will be detected in a video image using Deep Learning technique which is YOLOv6 Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
