Search Results - (( user identification learning algorithm ) OR ( java _ normalization algorithm ))
Search alternatives:
- identification learning »
- normalization algorithm »
- user identification »
- learning algorithm »
-
1
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
Get full text
Get full text
Student Project -
2
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
3
Deep Learning Based Face Attributes Recognition
Published 2018“…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
Get full text
Get full text
Monograph -
4
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…The results show a high 85% accuracy rate in determining the age of individuals. A user-friendly desktop system is created for input of facial photos and receiving immediate age estimation results, illustrating machine learning's assure in age identification. …”
Get full text
Get full text
Thesis -
6
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
7
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
8
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
9
New hybrid deep learning method to recognize human action from video
Published 2021“…This video content must be examined in order to classify it for different purposes for users. Several machine learning approaches for video classification have been developed to save users time and energy. …”
Get full text
Get full text
Get full text
Article -
10
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…An effective machine learning approach created from a separate examination of many machine learning algorithms in WEKA should be applied for the correct identification of heart disease. …”
Get full text
Get full text
Undergraduates Project Papers -
11
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Besides reducing the processing overhead it also achieves better results in terms of accuracy compared to the user agent approach. Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
Get full text
Get full text
Thesis -
12
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…Backpropagation learning algorithm has been used as a basis for learning in this study. …”
Get full text
Get full text
Get full text
Thesis -
13
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
14
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
15
Faulty classification system for VTOL UAV acoustic signal using machine learning
Published 2025“…Users can select their preferred features for faulty prediction using a specified supervised machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Personal identification by Keystroke Pattern for login security
Published 2001Get full text
Get full text
Thesis -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
18
Spotted hyena optimizer with deep learning driven cybersecurity for social networks
Published 2023“…Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
20
Designing an integrated AIOT system for tracking class attendance
Published 2024“…The objective of this project is accomplished in the creation of a reliable, scalable and user-friendly system for facial recognition attendance.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
