Search Results - (( (structures OR structural) vector tree algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia by Lim, San Yee

    Published 2018
    “…Hence, to ease the calculation process and improve the computational efficiency of RV coefficient, an algorithm is proposed. The proposed algorithm is able to measure the similarities among all pairs of stocks in Bursa Malaysia at once. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Machine learning methods for multi-rotor UAV structural damage detection based on MEMS sensor by Ma, Y., Mustapha, F., Ishak, M.R., Abdul Rahim, S., Mustapha, M.

    Published 2023
    “…Four machine learning algorithms, namely Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree, and Random Forest, are employed for damage detection. …”
    Get full text
    Get full text
    Article
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Image Classification for Age-related Macular Degeneration Screening Using Hierarchical Image Decompositions and Graph Mining by Mohd Hanafi Ahmad Hijazi, Chuntao Jiang, Frans Coenen, Yalin Zheng

    Published 2011
    “…The resulting decomposition is then stored in a tree structure to which a weighted frequent sub-tree mining algorithm is applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Tree species and aboveground biomass estimation using machine learning, hyperspectral and LiDAR data / Nik Ahmad Faris Nik Effendi by Nik Effendi, Nik Ahmad Faris

    Published 2022
    “…However, the identification process of tree species and AGB estimation in tropical forest is quite challenging either by traditional or remote sensing methods due to the structure of forest type. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis of Acoustic Emission Signal for Prediction of Corrosion on Carbon Steel Pipelines by Kafi, N.A., May, Z.B.

    Published 2021
    “…This project trained and tested two prediction algorithms, the quadratic Support Vector Machine (SVM) and ensemble RUSBoost trees, which classified Acoustic Emission (AE) data into three regions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Pattern Recognition for Human Diseases Classification in Spectral Analysis by Nur Hasshima Hasbi, Abdullah Bade, Fuei, Pien Chee, Muhammad Izzuddin Rumaling

    Published 2022
    “…This article discusses the fundamental assumptions, benefits, and limitations of some well-known pattern recognition algorithms including Principal Component Analysis (PCA), Kernel PCA, Successive Projection Algorithm (SPA), Genetic Algorithm (GA), Partial Least Square Regression (PLS-R), Linear Discriminant Analysis (LDA), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), Partial Least Square-Discriminant Analysis (PLS-DA) and Artificial Neural Network (ANN). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An efficient computational intelligence technique for classification of protein sequences by Iqbal, M.J., Faye, I., Said, A.M., Samir, B.B.

    Published 2014
    “…Popular classification algorithms such as decision tree, naive Bayes, neural network, random forest and support vector machine have been employed to evaluate the effectiveness of the encoding method utilized in the proposed framework. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  14. 14

    Machine Learning Approaches to Advanced Outlier Detection in Psychological Datasets by Abri K.Al., Sidhu M.S.

    Published 2025
    “…To this end, we employed three sophisticated algorithms: local outlier factor (LOF), one-class support vector machine (OCSVM), and isolation forest (IF). …”
    Article
  15. 15

    Feasibility analysis for predicting the compressive and tensile strength of concrete using machine learning algorithms by Ziyad Sami B.H., Ziyad Sami B.F., Kumar P., Ahmed A.N., Amieghemen G.E., Sherif M.M., El-Shafie A.

    Published 2024
    “…In this research, machine learning algorithms including regression models, tree regression models, support vector regression (SVR), ensemble regression (ER), and gaussian process regression (GPR) were utilized to predict the compressive and tensile concrete strength. …”
    Article
  16. 16

    Data mining of protein sequences with amino acid position-based feature encoding technique by Iqbal, M.J., Faye, I., Md Said, A., Samir, B.B.

    Published 2014
    “…In this paper, an amino acid position-based feature encoding technique is proposed to represent a protein sequence using a fixed length numeric feature vector. The classification results indicate that the proposed encoding technique with a decision tree classification algorithm has achieved 85.9 classification accuracy over the Yeast protein sequence dataset. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…This is because all translated in TBS text have an intrinsic structural styles that can be used to improve the performance of a blind steganalysis model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis