Search Results - (( _ (perceptions OR perception) method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Students’ perceptions towards the ethical considerations of using artificial intelligence algorithms in clinical decision-making by Lin, Galvin Sim Siang, Tan, Wen Wu, Hashim, Hasnah

    Published 2024
    “…Abstract Aim: The present study aimed to explore the perceptions of dental students regarding the ethical considerations associated with the use of artificial intelligence (AI) algorithms in clinical decision-making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim by Tuan Ibrahim, Tuan Nur Azlina

    Published 2024
    “…This study investigates public sentiment towards AI chatbots, recognizing the critical importance of understanding public perceptions for effective integration. Facing challenges with existing methods, the Support Vector Machine (SVM) algorithm is employed for its proficiency in handling textual data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida Abdullah, Nur Haizum Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida, Abdullah, Nur Haizum, Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…While some generic reconstruction methods exist, they lag AS ones in performance. Additionally, these methods often don’t consider visual perception, even though human vision is crucial in most applications. …”
    Get full text
    Thesis
  12. 12

    Application of the bees algorithm to the selection features for manufacturing data by Pham, D.T, Mahmuddin, Massudi, Otri, S., Al-Jabbouli, H.

    Published 2007
    “…A “wrapper” feature selection method using the Bees Algorithm and Multilayer Perception (MLP) networks is described in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…Hence, the development of DIS algorithm has successfully help in producing the edges features on a particular surface topography that are accurate and in line with what has been agreed based on human perception.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Behavioural influence of TikTok’s algorithm recommendations on users’ engagement and users’ self-persuasion / Siti Khadijah Amir Hamzah, Ahlam Abdul Aziz and Shazleen Mohamed by Amir Hamzah, Siti Khadijah, Abdul Aziz, Ahlam, Mohamed, Shazleen

    Published 2025
    “…These biases can reinforce specific behaviours and viewpoints, create echo chambers, and influence users' self-perception. By focusing on maximizing engagement, the algorithm can also promote addictive behaviours, impact mental health, shorten attention spans, and disrupt daily activities. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Characteristics of electronic cigarette and vape users in Malaysia: Lessons from decision tree analysis by Kartiwi, Mira, Nik Mohamed, Mohamad Haniki, Ab Rahman, Jamalludin, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2020
    “…Several predictor variables included in this study were: seven demographics variables (i.e., age, gender, race, residence, marital, occupation and education) and twenty variables on the perception of ECV use. An Induction Decision Tree (ID3) algorithm, one of the renowned data mining technique, was used in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Prediction of electronic cigarette and vape use among Malaysian: decision tree analysis by Kartiwi, Mira, Ab Rahman, Jamalludin, Nik Mohamed, Mohamad Haniki, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2017
    “…Methods: The dataset was extracted from the National Electronic Cigarette Survey (NECS) 2016.A total of 4,288 responses were collected. …”
    Get full text
    Get full text
    Get full text
    Article