Search Results - (( _ perceptions method algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Students’ perceptions towards the ethical considerations of using artificial intelligence algorithms in clinical decision-making by Lin, Galvin Sim Siang, Tan, Wen Wu, Hashim, Hasnah

    Published 2024
    “…Abstract Aim: The present study aimed to explore the perceptions of dental students regarding the ethical considerations associated with the use of artificial intelligence (AI) algorithms in clinical decision-making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim by Tuan Ibrahim, Tuan Nur Azlina

    Published 2024
    “…This study investigates public sentiment towards AI chatbots, recognizing the critical importance of understanding public perceptions for effective integration. Facing challenges with existing methods, the Support Vector Machine (SVM) algorithm is employed for its proficiency in handling textual data. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…DAMIRA successfully clustered all of the data, while INSCY method has a lower coverage than FIRES method. For F1 Measure, SUBCLU method is better than FIRES, INSCY, and DAMIRA. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of the bees algorithm to the selection features for manufacturing data by Pham, D.T, Mahmuddin, Massudi, Otri, S., Al-Jabbouli, H.

    Published 2007
    “…A “wrapper” feature selection method using the Bees Algorithm and Multilayer Perception (MLP) networks is described in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida Abdullah, Nur Haizum Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…While some generic reconstruction methods exist, they lag AS ones in performance. Additionally, these methods often don’t consider visual perception, even though human vision is crucial in most applications. …”
    Get full text
    Thesis
  17. 17

    Behavioural influence of TikTok’s algorithm recommendations on users’ engagement and users’ self-persuasion / Siti Khadijah Amir Hamzah, Ahlam Abdul Aziz and Shazleen Mohamed by Amir Hamzah, Siti Khadijah, Abdul Aziz, Ahlam, Mohamed, Shazleen

    Published 2025
    “…These biases can reinforce specific behaviours and viewpoints, create echo chambers, and influence users' self-perception. By focusing on maximizing engagement, the algorithm can also promote addictive behaviours, impact mental health, shorten attention spans, and disrupt daily activities. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Primitive structural method for high capacity text steganography by Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…We propose a Primitive Structural algorithm for Arabic text steganography to encounter this issue. …”
    Get full text
    Get full text
    Article