Search Results - (( user identification learning algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- identification learning »
- normalization algorithm »
- user identification »
- learning algorithm »
- data normalization »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
Get full text
Get full text
Student Project -
3
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
4
Deep Learning Based Face Attributes Recognition
Published 2018“…The automated face identification application is helpful in assisting forensic to survey an area with the implementation of Machine Learning (ML). …”
Get full text
Get full text
Monograph -
5
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
8
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…The results show a high 85% accuracy rate in determining the age of individuals. A user-friendly desktop system is created for input of facial photos and receiving immediate age estimation results, illustrating machine learning's assure in age identification. …”
Get full text
Get full text
Thesis -
9
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
10
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
11
New hybrid deep learning method to recognize human action from video
Published 2021“…This video content must be examined in order to classify it for different purposes for users. Several machine learning approaches for video classification have been developed to save users time and energy. …”
Get full text
Get full text
Get full text
Article -
12
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…An effective machine learning approach created from a separate examination of many machine learning algorithms in WEKA should be applied for the correct identification of heart disease. …”
Get full text
Get full text
Undergraduates Project Papers -
13
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Besides reducing the processing overhead it also achieves better results in terms of accuracy compared to the user agent approach. Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
Get full text
Get full text
Thesis -
14
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…Backpropagation learning algorithm has been used as a basis for learning in this study. …”
Get full text
Get full text
Get full text
Thesis -
15
Faulty classification system for VTOL UAV acoustic signal using machine learning
Published 2025“…Users can select their preferred features for faulty prediction using a specified supervised machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
17
Personal identification by Keystroke Pattern for login security
Published 2001Get full text
Get full text
Thesis -
18
Spotted hyena optimizer with deep learning driven cybersecurity for social networks
Published 2023“…Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Designing an integrated AIOT system for tracking class attendance
Published 2024“…The objective of this project is accomplished in the creation of a reliable, scalable and user-friendly system for facial recognition attendance.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article
