Search Results - (( _ perception method algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Students’ perceptions towards the ethical considerations of using artificial intelligence algorithms in clinical decision-making by Lin, Galvin Sim Siang, Tan, Wen Wu, Hashim, Hasnah

    Published 2024
    “…Abstract Aim: The present study aimed to explore the perceptions of dental students regarding the ethical considerations associated with the use of artificial intelligence (AI) algorithms in clinical decision-making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim by Tuan Ibrahim, Tuan Nur Azlina

    Published 2024
    “…This study investigates public sentiment towards AI chatbots, recognizing the critical importance of understanding public perceptions for effective integration. Facing challenges with existing methods, the Support Vector Machine (SVM) algorithm is employed for its proficiency in handling textual data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Application of the bees algorithm to the selection features for manufacturing data by Pham, D.T, Mahmuddin, Massudi, Otri, S., Al-Jabbouli, H.

    Published 2007
    “…A “wrapper” feature selection method using the Bees Algorithm and Multilayer Perception (MLP) networks is described in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida Abdullah, Nur Haizum Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…While some generic reconstruction methods exist, they lag AS ones in performance. Additionally, these methods often don’t consider visual perception, even though human vision is crucial in most applications. …”
    Get full text
    Thesis
  17. 17

    Behavioural influence of TikTok’s algorithm recommendations on users’ engagement and users’ self-persuasion / Siti Khadijah Amir Hamzah, Ahlam Abdul Aziz and Shazleen Mohamed by Amir Hamzah, Siti Khadijah, Abdul Aziz, Ahlam, Mohamed, Shazleen

    Published 2025
    “…These biases can reinforce specific behaviours and viewpoints, create echo chambers, and influence users' self-perception. By focusing on maximizing engagement, the algorithm can also promote addictive behaviours, impact mental health, shorten attention spans, and disrupt daily activities. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Primitive structural method for high capacity text steganography by Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…We propose a Primitive Structural algorithm for Arabic text steganography to encounter this issue. …”
    Get full text
    Get full text
    Article
  20. 20

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida, Abdullah, Nur Haizum, Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article