Search Results - (( developing developing function algorithm ) OR ( system implementation tree algorithm ))

Refine Results
  1. 1

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…An algorithm vision based page segmentation algorithm will be implemented in this system to extract the data from multiple websites and will be displayed in new website. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Developing an app for streamlined inventory tracking with barcode scanning and load planning optimization by Teng, Yan Xin

    Published 2025
    “…Keywords: Inventory Management, Barcode Scanning, Load Planning, Binary Tree Bin Packing Algorithm, Mobile Application Development. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…Hence, two transfer learning algorithms were proposed and implemented to provide initial performance boost to the River adaptive random forest regressor and classifier, respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…Othman proposed a clustering algorithm named BTreeBicluster. The BTreeBicluster starts with the development of GO tree and enriching it with expression similarity from the Sacchromyces genes. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani by Che Ani, Adi Izhar

    Published 2023
    “…In the human gait model, three Machine Learning algorithms were used: Gaussian Process Regression, Support Vector Machine, and Decision Tree. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…However, the computation for the development of SVDM algorithm is more challenging especially for the images with complex scenes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…Watershed segmentation function was employed to separate the connected trees and missing trees regions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The Random Tree standalone ML-AP relay model presented the best performing models from the ML-APS relay model with the best average performance for the correctly classified fault types of 97.61 % at 5 % significance level above other ML algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Oral Dictionary by Md. Radzi, Ashylla

    Published 2006
    “…Since the output speed is critical, binary search tree algorithm is chosen as best data structure to be implemented in this application to improve the searching time performance. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Drone-based surveillance of palm tress ecosystems by Mansor, Ya’akob, Baki, Sharudin Omar, Sahwee, Zulhilmy, Mengyue, Cheng, Wu, Yuanyuan

    Published 2024
    “…Furthermore, the loss graph exhibits a similar trend to the RMSE graph, corroborating the effectiveness of RMSE as a common loss function for regression problems. Overall, this research contributes to the advancement of oil palm tree health detection systems, providing valuable insights for future developments in agricultural surveillance and monitoring technologies.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Terahertz sensing analysis for early detection of ganoderma boninense disease using near infrared (NIR) spectrometer by Mas Ira Syafila, Mohd Hilmi Tan

    Published 2023
    “…A portable smart G. boninense detection system prototype is developed by implementing the Internet of Things (IoT) into the system which enables the integration of sensors and server to perform prediction of healthy or infected oil palm seedlings. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary by Mohd Zamary, Nurul Aida

    Published 2024
    “…The phase of this project is divided into data preprocessing, implementation of the decision tree algorithm, and evaluation of the algorithm and prototype. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation by Hujainah, Fadhl Mohammed Omar

    Published 2019
    “…Furthermore, the proposed SRPTackle is based on the combination of the proposed StakeQP technique, the constructed requirement priority value formulation function and the employing of classifying algorithm (K-means and K-means++) and binary search tree. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…In conclusion, the hybrid algorithm based solution strategies improved efficiency with convincing results, therefore, this will assist planners for better decision making to optimize area to achieve more trees to be planted. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac) by Teh , Choon Yan

    Published 2014
    “…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
    Get full text
    Get full text
    Thesis