Search Results - (( developing learning stemming algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- stemming algorithm »
- learning stemming »
- validation using »
- java validation »
- using algorithm »
-
1
Analyzing enrolment patterns: modified stacked ensemble statistical learning based approach to educational decision-making
Published 2024“…In the realm of global Science, Technology, Engineering, and Mathematics (STEM) education, the declining enrolment in advanced mathematics courses poses a substantial challenge to the development of a robust STEM workforce and its role in sustainable economic growth. …”
Get full text
Get full text
Get full text
Article -
2
Analyzing enrolment patterns: Modified stacked ensemble statistical learning-based approach to educational decision-making
Published 2024“…In the realm of global Science, Technology, Engineering, and Mathematics (STEM) education, the declining enrollment in advanced mathematics courses poses a substantial challenge to the development of a robust STEM workforce and its role in sustainable economic growth. …”
Get full text
Get full text
Get full text
Article -
3
Analyzing enrolment patterns: Stacked ensemble statistical learning-based approach to educational decision making
Published 2023“…The study’s primary objectives were to identify the determinants that impacted urban upper-secondary students' enrolment in Additional Mathematics within the Kuantan District, Pahang, Malaysia, and to develop a novel stacked ensemble machine learning algorithm based on these determinants, following the CRISP-DM data science methodology. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
7
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
9
-
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
12
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
13
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
14
Sentiment analysis of customer reviews for Konda Kondi Cafe & Bistro
Published 2025“…The data was pre-processed using tokenization, stop-word removal, and stemming techniques to ensure quality inputs. Machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes (NB), and Decision Tree (DT) were applied using RapidMiner to build classification models. …”
Get full text
Get full text
Student Project -
15
Performance assessment of Sn-based lead-free solder composite joints based on extreme learning machine model tuned by Aquila optimizer
Published 2025“…The presence of MWCNTs in the Sn-5Sb solder alloy significantly prevented IMC formation at the interface and enhanced the shear strength, according to empirical observations, which were supported by the excellent properties of MWCNTs. An extreme learning machine (ELM) prediction approach refined by Aquila optimizer (AO), a new cutting-edge metaheuristic optimization algorithm was utilized to develop a prediction model for the performance assessment of the developed solder composites. …”
Article -
16
Performance assessment of Sn-based lead-free solder composite joints based on extreme learning machine model tuned by Aquila optimizer
Published 2024“…The presence of MWCNTs in the Sn-5Sb solder alloy significantly prevented IMC formation at the interface and enhanced the shear strength, according to empirical observations, which were supported by the excellent properties of MWCNTs. An extreme learning machine (ELM) prediction approach refined by Aquila optimizer (AO), a new cutting-edge metaheuristic optimization algorithm was utilized to develop a prediction model for the performance assessment of the developed solder composites. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Text-based emotion prediction system using machine learning approach
Published 2020“…Therefore, four supervised machine learning classification algorithms such as Multinomial Naïve Bayes, Support Vector Machine, Decision Trees, and kNearest Neighbors were investigated. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Word problems as a vehicle for teaching computational thinking
Published 2023“…A computational mathematics problem-based learning (CM-PBL) teaching technique is developed to achieve these goals. …”
Get full text
Get full text
Get full text
Article -
20
