Search Results - (( based constructive window algorithm ) OR ( java application tree algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…To detect targets in such environments, it needs a robust CFAR algorithm that excises the target spikes and clutter edges from the CFAR window to give the best possible estimation of the noise background. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV) by Mustaffa Kamal Basha, Abdul Aziz

    Published 2016
    “…These data will be output using the embedded server to the client, which is a windows-based tablet PC and the embedded server is cRIO-9076. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    The design and implementation of a two and three-dimensional triangular irregular network based GIS by Abdul Rahman, Alias

    Published 2000
    “…To facilitate the output of the developed methods and algorithms, software called TinSoft, which is a Windows-based Multiple Document Interface software was developed in this research.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…It is a windows application with http connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Reservoir water release dynamic decision model based on spatial temporal pattern by Suriyati, Abdul Mokhtar

    Published 2016
    “…The modified Sliding Window algorithm was used to construct the rainfall temporal pattern, while the spatial information was established by simulating the mapped rainfall and reservoir water level pattern. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Numerical Modelling of the Electric Vehicle Cabin Cooling by Jong, Fabian Chin Peng

    Published 2019
    “…The study of the cabin cooling system in an Electric Vehicle is vital to understand its energy consumption behaviour, where such information can be acted upon to better optimise and improve the overall energy consumption of the vehicle, thus translating into a longer driving range.Factors that contribute to the total thermal load in a cabin space are modelled, where in Edinburgh has a value of 1880.14 W and 3136.14 W for Kuala Lumpur.Expansion is performed in the construction of the solar thermal load model, which has the capability of calculating solar irradiance based on various inputs, which after validation produces a relative error of 7.17 %. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…We reason that the proposed cryptographic hard problem can be used for developing practical cryptographic constructions. In parallel, we review the AAb cryptosystem based on the design of Rabin-p function over integers and also as a demonstration of the proposed cryptographic hard problem concept. …”
    Get full text
    Get full text
    Thesis