Search Results - (( data orientation learning algorithm ) OR ( java application path algorithm ))

Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan by Mohd Hanis, Rani, Abdullah, Embong

    Published 2013
    “…The paper focuses on prediction of student learning performance in object oriented programming course using data mining technique based on a dataset obtained from Kolej Poly-Tech Mara (KPTM), Kuantan. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Automated Bird Species Identification Through Machine Learning Techniques by Suhil Shoukath, Kambali, Ushashree, R.

    Published 2024
    “…In recent years, machine learning algorithms and pre-trained models such as ResNet, Histogram of Oriented Gradients (HOG), and Scale-Invariant Feature Transform (SIFT) have shown significant promise in automating bird species classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network by Asirvadam , Vijanth Sagayan, McLoone, Sean

    Published 2007
    “…In this paper hybrid form recursive training algorithms, which combines both linear and nonlinear orientation of weights, is being used to model or identify ElectroCardioGraphy (ECG) signals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  16. 16

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  17. 17

    A Review: Current Trend of Immersive Technologies for Indoor Navigation and the Algorithms by Sariman, Muhammad Shazmin, Othman, Maisara, Mat Akir, Rohaida, Mahamad, Abd Kadir, Ab Rahman, Munirah

    Published 2024
    “…Based on the findings of this review, we can conclude that an efficient solution for indoor navigation that uses the capabilities of embedded data and technological advances in immersive technologies can be achieved by training the shortest path algorithm with a deep learning algorithm to enhance the indoor navigation system.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas by Md Jelas, Imran

    Published 2022
    “…LSTM, an ANN can recall both current data and past data. LTSM pertinent for vision-based sign language recognition system especially when continuous image is used as in the proposed framework.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Nurul Syafiqah, Zaidi, Al Fahim, Mubarak Ali, Ahmad Firdaus, Zainal Abidin, Ibrahim, Adamu Abubakar, Aldharhani, Ghassan Saleh, Mohd Faizal, Ab Razak

    Published 2025
    “…The machine learning-based authentication model for smart healthcare systems represents a crucial step in addressing the needs of an ever-evolving healthcare industry. …”
    Get full text
    Get full text
    Get full text
    Article