Search Results - (( _ perceptions method algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- method algorithm »
- java application »
- perceptions »
-
1
-
2
-
3
-
4
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Students’ perceptions towards the ethical considerations of using artificial intelligence algorithms in clinical decision-making
Published 2024“…Abstract Aim: The present study aimed to explore the perceptions of dental students regarding the ethical considerations associated with the use of artificial intelligence (AI) algorithms in clinical decision-making. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
Get full text
Get full text
Thesis -
8
Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim
Published 2024“…This study investigates public sentiment towards AI chatbots, recognizing the critical importance of understanding public perceptions for effective integration. Facing challenges with existing methods, the Support Vector Machine (SVM) algorithm is employed for its proficiency in handling textual data. …”
Get full text
Get full text
Thesis -
9
-
10
Density subspace clustering: a case study on perception of the required skill
Published 2014“…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
Get full text
Get full text
Thesis -
11
Application of the bees algorithm to the selection features for manufacturing data
Published 2007“…A “wrapper” feature selection method using the Bees Algorithm and Multilayer Perception (MLP) networks is described in this paper. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
Get full text
Get full text
Get full text
Thesis -
13
3D LiDAR Vehicle Perception and Classification Using 3D Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis
Published 2025“…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…While some generic reconstruction methods exist, they lag AS ones in performance. Additionally, these methods often don’t consider visual perception, even though human vision is crucial in most applications. …”
Get full text
Thesis -
17
Behavioural influence of TikTok’s algorithm recommendations on users’ engagement and users’ self-persuasion / Siti Khadijah Amir Hamzah, Ahlam Abdul Aziz and Shazleen Mohamed
Published 2025“…These biases can reinforce specific behaviours and viewpoints, create echo chambers, and influence users' self-perception. By focusing on maximizing engagement, the algorithm can also promote addictive behaviours, impact mental health, shorten attention spans, and disrupt daily activities. …”
Get full text
Get full text
Get full text
Article -
18
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
19
Design of a pattern classification system using extreme learning machine
Published 2024text::Final Year Project -
20
Primitive structural method for high capacity text steganography
Published 2014“…We propose a Primitive Structural algorithm for Arabic text steganography to encounter this issue. …”
Get full text
Get full text
Article
