Search Results - (( based generation method algorithm ) OR ( using factorization machine algorithm ))

Refine Results
  1. 1

    An Embedded Machine Learning-Based Spoiled Leftover Food Detection Device for Multiclass Classification by Wan Azman,, Wan Nur Fadhlina Syamimi, Ku Azir, Ku Nurul Fazira, Mohd Khairuddin, Adam

    Published 2024
    “…In conclusion, the work demonstrates a novel method for using machine learning algorithms to classify, identify, and predict the contamination level of leftover cooked food, contributing to reducing food waste generated primarily by Malaysians…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…In today’s competitive market of manufacturing industry, shorter machining time is one of important factor for reducing the manufacturer’s cost. …”
    Get full text
    Get full text
    Article
  3. 3

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…To summarise, metaheuristic algorithms can give a superior optimization approach than the traditional artificial neural network method, providing the computing time is within an acceptable range. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach by Wan Solehah, Wan Ahmad

    Published 2022
    “…The adoption of DNN method into chatbot application produces a new generation chatbot that called as Generative-Based Chatbot. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…Nevertheless, AC is not required for LCM if the original multi-spectral image is used. The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10

    High-Resolution Downscaling with Interpretable Relevant Vector Machine: Rainfall Prediction for Case Study in Selangor by Abdul Rashid, Raghdah Rasyidah, Shaharudin, Shazlyn Milleana, Sulaiman, Nurul Ainina Filza, Zainuddin, Nurul Hila, Mahdin, Hairulnizam, Mohd Najib, Summayah Aimi, Hidayat, Rahmat

    Published 2024
    “…The Principal Component Analysis (PCA) technique was employed to choose relevant environmental variables as input for the machine learning model, and various imputation methods were utilized to manage missing data, such as mean imputation and the KNN algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Blind Source Separation Using Two-Dimensional Nonnegative Matrix Factorization In Biomedical Field by Toh, Cheng Chuan

    Published 2018
    “…Theoretically,β and α is parameters that used to vary the NMF2D algorithm in order to yield high SDR value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Auxiliary-based extension of multi-tasking sequence-to-sequence model for chatbot answers by Palasundram, Kulothunkan

    Published 2021
    “…Besides, many chatbots are developed using the single-task learning (“STL”) method which executes only the response generation task. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…Therefore, this research proposes a modified group authentication scheme for MTC in an LTE/LTE-A network in order to reduce signalling and computational overheads. The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Hybrid Machine Learning and Optimisation-Based Model for Predicting the Success of Business-To-Consumer Software Development Projects in Indonesia by Setiawan, Rudi

    Published 2025
    “…Building on these findings, a predictive framework is constructed by integrating machine learning algorithms with advanced optimization and data handling strategies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
    Article
  17. 17

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…From news classification and news sentiment, a rule-based algorithm was used to predict the stock market turning points. …”
    Get full text
    Get full text
    Book Section
  18. 18

    Energy and cost integration model for multi-objective optimisation in turning process of stainless steel 316 by Bagaber, Salem Salah Abdullah

    Published 2019
    “…Cutting fluids that are oil-based are unsustainable as the machining process has an environmental impact. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Classification and prediction of obesity levels among subjects in Colombia, Peru, and Mexico using unsupervised and supervised learning by Suhaila, Bahrom, Anuar, Ab Rani, Aisyah Amalina, Mohd Noor

    Published 2024
    “…Supervised learning algorithms like logistic regression, random forest, and adaboost classifier predict obesity levels based on labelled datasets, with random forest exhibiting superior performance. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Optimal Maintenance Scheduling for Multi-Component E-Manufacturing System by Arab, Ali

    Published 2009
    “…Then, using genetic algorithm-based software which is called SimRunner and has been embedded by ProModel, the scheduling optimization procedure is run to find optimum maintenance schedule. …”
    Get full text
    Get full text
    Thesis