Search Results - (( developing a intervention algorithm ) OR ( java code classification algorithm ))

Refine Results
  1. 1

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  3. 3

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…It is noted that active user intervention increases the acceleration of Genetic Algorithm towards an optimal solution. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    i-Saturate: The New Discovery of Stopping Criterion in Genetic Algorithm by Foo, Fong Yeng, Suhaimi, Azrina, Soo, Kum Yoke

    Published 2020
    “…A stopping criterion for evolutionary algorithms like Genetic Algorithm (GA) is crucial in determining the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…A Wilcoxon signed rank test showed a significant change in incidence scores of households in the district considered for pre- and post-test interventions. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Wireless water quality cloud monitoring system with self-healing algorithm by Syed Ariffin, Sharifah Hafizah, Baharudin, Muhammad Ariff, Mohd Fauzi, Mohd Husaini, Abdul Latiff, Nurul Mu'azzah, Syed Yusof, Sharifah Kamilah, Abdul Latiff, Nurul Adilah

    Published 2017
    “…The new platform to date for the Internet of Things (IoT) and cloud database is Favoriot. Favoriot is a platform for IoT and machine-to-machine (M2M) development. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…The algorithm is done when a final checking on the clock skew is done. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Prediction of UiTM student academic performance using Naive Bayes algorithm / Muhammad Irfan Zahin Jailani by Jailani, Muhammad Irfan Zahin

    Published 2024
    “…With the help of customized interventions and early identification of at-risk pupils, the proposed approach seeks to increase graduation rates and overall achievement.The main objectives of this study include studying the Naive Bayes algorithm in student academic performance prediction, designing and developing a student academic performance prediction model utilizing Naive Bayes, and evaluating the accuracy of the prediction prototype using the developed model. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Predictive Modelling of Stroke Occurrence among Patients using Machine Learning by Sures, Narayasamy, Thilagamalar, Maniam

    Published 2023
    “…Advanced machine learning algorithms, including logistic regression, decision trees, random forests, and support vector machines, were utilized to analyses the dataset and develop a predictive model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of a wearable human fall detection system by Chua, Kean Hong, Sai, Siong Jun, Chan, Chi Yen, Kamsani, Noor Ain, Che Soh, Azura, Raja Ahmad, Raja Mohd Kamil

    Published 2022
    “…In this study, an accelerometer and gyroscope sensors were installed in a wearable fall detector. A fall detection algorithm was developed using MATLAB. …”
    Get full text
    Get full text
    Article
  14. 14

    Reliability fuzzy clustering algorithm for wellness of elderly people by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Therefore, the implementation of z-numbers is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. Thus, the objective of this paper is to propose a reliable fuzzy clustering algorithm using z-numbers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16

    Screen-related dependency in children: algorithm for referral from primary care in Malaysia by Abdul Hadi, Azwanis, Mohammad Aidid, Edre, Musa, Ramli

    Published 2025
    “…While there are general guidelines, i.e., limiting screen time by WHO, there are not yet any specific outlines or pathways provided for healthcare providers at the primary care level, especially in the Malaysian context. This algorithm was developed by a group of Malaysian experts for primary care, aiming to facilitate the early screening of screen-related dependency in pre-school children and its referral for psychological interventions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database by Zainol Abidin, Husna, M. Yassin, Ihsan, Abdul Rahman, Farah Yasmin

    Published 2011
    “…Undergoing research is trying to develop interventions to both delay the onset of AD, as well as to slow the progression of the disease. …”
    Get full text
    Get full text
    Research Reports
  19. 19
  20. 20

    Automatic assessment for engineering drawing by Goh, K.N., Mohd. Shukri, S.R., Manao, R.B.H.

    Published 2013
    “…To achieve this goal, we have explored methods to convert DXF files into SVG format and develop a marking algorithm for the generated SVG files. …”
    Get full text
    Get full text
    Article