Search Results - (( developing building random algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…To our knowledge, there is still no implementation of machine learning models on green building valuation features for building price prediction compared to conventional building development. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil by Jamil, Nur Syafiqah

    Published 2021
    “…Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation by Hassan Disina, Abdulkadir, Jamel, Sapiee, Abubakar Pindar, Zahraddeen, Mat Deris, Mustafa

    Published 2018
    “…Quasigroup String transformation is one of those primitives that have many applications in cryptographic algorithms, Hash functions, and Pseudo-Random Number Generators. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    The Random forest algorithm for modelling the overspending behaviour of Malaysian households income class by Liyana Ihkwani Abdul Latif, Azuraliza Abu Bakar, Zulaiha Ali Othman, Mohd Suhaidi Abdul Rais, Mazniha Berahim

    Published 2025
    “…This study proposed the use of the Random Forest method to build a predictive model of overspending behaviour among Malaysian households in the B40, M40, and T20 income groups. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Identification and Grading of Manage Using Image Processing by Shukor, Syazwan

    Published 2021
    “…Experimental chamber for image acquisition is developed in building the image dataset. 40 random samples of "Mangga Susu Gold Thai mangos are sampled. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters by Abusalama, Jawad

    Published 2025
    “…Notably, as the number of bidders increased, the execution time of competing approaches escalated exponentially, while the proposed approaches exhibited a steady increase. Building on the proposed algorithm and approaches, Agent-Based Simulation (ABS) models were developed to evaluate both evacuation and rescue operations in Al-Aqsa Mosque (AM) scenarios in Palestine. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Green building factor in machine learning based condominium price prediction by Masrom, S., Mohd, T., Rahman, A.S.A.

    Published 2022
    “…The negative impact of massive urban development promotes the inclusion of green building aspects in the real estate and property industries. …”
    Get full text
    Get full text
    Article
  12. 12

    Focal and non-focal epilepsy localization: a review by Hussein, Ahmed Faeq, N., Arunkumar, Gomes, Gorakanage Arosha Chandima, Alzubaidi, Abbas K., Habash, Qais Ahmed, Granados, Luz Santamaria, Moreno, Juan Francisco Mendoza, Gonzalez, Gustavo Ramirez

    Published 2018
    “…Various methodical and algorithmic studies have indicated that the transition to an ictal state is not a random process, and the build-up can lead to epileptic seizures. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    GPS-less Localization Protocol for Underwater Acoustic Networks by Othman, A.K.

    Published 2008
    “…Four different algorithms have been investigated; (i) Farthest/Farthest Algorithm, (ii) Farthest/Nearest Algorithm, (iii) Nearest/Farthest Algorithm and (iv) Nearest/Nearest Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    INDOOR LOCATION SENSING USING WLAN by MOORTHY, SATHIS KUMAR

    Published 2007
    “…The basic idea was to build a database of signal strength information for various predetermined locations. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Design and development of cooperative simultaneous localization and mapping integrated with neural network for mobile robot by Jamaludin, Amirul

    Published 2024
    “…Secondly, a framework of CSLAM algorithm integrated with ANN using Rao-Blackwellized particle filter (RBPF) algorithm for single SLAM robot, and the map merging using random sample consensus (RANSAC) algorithm, is designed and developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A new intelligent multilayer framework for insider threat detection by Ahmad, Rabiah, Al-Mhiqani, Mohammed Nasser Ahmed, Zainal Abidin, Zaheera, Abdulkareem, Karrar Hameed, Mohammed, Mazin Abed, Gupta, Deepak K., Shankar K.

    Published 2021
    “…For the second layer, a hybrid insider threat detection method has been proposed, where the Misuse Insider Threat Detection (MITD) model has been created using the random forest algorithm. Subsequently, using the K-Nearest Neighbors algorithm, an anomaly insider threat detection algorithm has been developed. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun by Goh, Wei Sheng, Wan Din, Wan Isni Sofiah, Waseem, Quadri, Zabidi, A.

    Published 2023
    “…Unmanned Aerial Vehicles (UAV) can automate, avoid visual inspection, and avoid other physical check-ups of these buildings. Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman by Abdul Aziz, Maslina, Mustakim, Nurul Ain, Abdul Rahman, Shuzlina

    Published 2024
    “…The result indicated that the highest accuracy of 89.34% was achieved by the Random Tree algorithm, while the rule-based algorithm PART reached an accuracy of 87.56%. …”
    Get full text
    Get full text
    Article