Search Results - (( data promoting problem algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- promoting problem »
- problem algorithm »
- java application »
- data promoting »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
5
Efficient transmission based on genetic evolutionary algorithm
Published 2022“…The basic working principle and main characteristics of genetic algorithm (GA) are summarized, and the theory, technology and existing problems of GA are discussed. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012Get full text
Get full text
Conference or Workshop Item -
7
Development and validation of promoter prediction system for recombinant lipase expression in Pichia pastoris
Published 2017“…This study aims to develop a promoter prediction system for recombinant lipase expression in commonly used yeast expression system, P. pastoris using BLAST heuristic algorithm. …”
Get full text
Get full text
Thesis -
8
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…Children abandoned in vehicles is a critical issue that has led to numerous fatal injuries worldwide. To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
9
K-Means Clustering Approach for Intelligent Customer Segmentation Using Customer Purchase Behavior Data
Published 2022“…In order to process the collected data and segment the customers, an learning algorithm is used which is known as K-Means clustering. …”
Get full text
Get full text
Article -
10
Sentiment analysis of restaurant reviews in Kuala Terengganu based on K-Nearest Neighbor/ Siti Syazwana Jafri
Published 2021“…In the future, it is very recommended to experiment with different algorithm. The volume of data should be large as it can generate better result of classification method.…”
Get full text
Get full text
Thesis -
11
Diagnosis of breast cancer using case-based reasoning
Published 2012“…The application used the 100 data of Wisconsin Breast Cancer dataset for evaluating the CBR algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Building customer churn prediction models in Indonesian telecommunication company using decision tree algorithm
Published 2023“…This study uses data mining techniques with decision tree algorithms to predict customer churn in one of Indonesian Telecommunication companies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Sentiment analysis on national cultural tourism using Linear Support Vector Machine (LSVM) / Nur Haida Hanna Samsuddin
Published 2020“…In future, it is recommended to experiment with different algorithm or kernel of Support Vector Machine. The volume of data should be large as it can generate better result of classification method.…”
Get full text
Get full text
Thesis -
14
Data Analytics on student response via social media on the educational landscape (learning, experience, humanization) during the COVID-19 pandemic
Published 2020“…All comments from particularly selected posts are retrieved via a data extraction tool. Then, a sentiment analysis of the comments is carried out using machine learning algorithms such as Support Vector Machine to analyse the sentiments conveyed by the students via their comments. …”
Get full text
Get full text
Final Year Project -
15
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. The problem is that the cupping suction system experiences pressure leaks and is difficult to control. …”
Get full text
Get full text
Get full text
Article -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…Hence, finding a fast, accurate, and strong solution to solve the range-free localization problem is still a big challenge. Accordingly, this study aspires to bridge the research gap by exploring a new DV-Hop algorithm to build a fast, costefficient, strong range-free localization scheme. …”
Get full text
Get full text
Thesis -
18
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…Promoting different kind of skills and abilities among students is important to solve the complexity problem in real world. …”
Get full text
Get full text
Conference or Workshop Item -
19
Personalized one-shot local adaptation federated learning for mortality prediction in multi-center Intensive Care Unit
Published 2024“…Unlike traditional data-centralized ML methods, federated learning (FL) provides a novel and promising distributed learning scheme to promote ML in multiple healthcare institutions while preserving data privacy. …”
Get full text
Get full text
Get full text
Thesis -
20
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…Experimental method was used by employing five social network datasets including Epinions, Wiki-Vote, SlashDot, Facebook and Twitter from Stanford data repository. Evaluation on IDTU was performed against 3 greedy and 6 heuristics benchmark algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis
