Search Results - (( developing relationship key algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- developing relationship »
- relationship key »
- java implication »
- implication tree »
- tree algorithm »
- key algorithm »
-
1
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. Last objectives will be the analysis on the relationship between the dependent and independent variables that be made through the correlation coefficient analysis. …”
Get full text
Get full text
Thesis -
2
Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali
Published 2025“…These insights can assist policymakers, mental health professionals, and marriage counselors in developing targeted interventions to support healthier relationships and strengthen societal well-being.…”
Get full text
Get full text
Thesis -
3
Modified spectral clustering algorithm for semisupervised face annotation modeling
Published 2025“…To improve accuracy, an optimized similarity matrix was developed. It also integrated MustLink (ML) and Cannot-Link (CL) constraints, generated efficiently via the Label Propagation Algorithm (LPA) enhanced by combining Share Nearest Neighbour (SNN) and Radial Basis Function (RBF). …”
Get full text
Get full text
Thesis -
4
A kinematic concept for robotic assisted dental rehabilitation / Muhammad Azmi Ayub... [et al.]
Published 2017“…A homogeneous transformation matrix that relates the key elements of translation and rotation in the robotic work cell concept is developed. …”
Get full text
Get full text
Get full text
Article -
5
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
6
Three-point Block Algorithm For Approximating Duffing Type Differential Equations
Published 2024journal::journal article -
7
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This project is developed by using Waterfall Model methodology as it’s the most direct model that is suitable for developing a system which consist of 5 phases which are Requirement Analysis, Design, Implementation, Testing and Maintenance. …”
Get full text
Get full text
Thesis -
9
Learning style analysis based on Felder-Silverman Index Model using Rule Base algorithm
Published 2024“…The Rule Base algorithm is used to classify students based on their learning style characteristics. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Reverse migration prediction model based on machine learning / Azreen Anuar
Published 2024“…In addition, the results from the three (3) algorithms that were tested showed that Random Forest outperforms other algorithms by acquiring an accuracy and classification error to predict reverse migration. …”
Get full text
Get full text
Thesis -
11
Exploring students' performance in mathematics in Portugal using data analytics techniques: a data science use-case
Published 2024“…This research project investigates the relationship between family background and student performance in Mathematics in Portugal. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. The secured ECG transmission system will work on the fourth industrial revolution with four major themes: speed of care, ability to manage illness, the role of patient and the relationship between healthcare and service provider. …”
Get full text
Get full text
Article -
13
Drought-events and potential impacts on land use/land cover dynamics based on AVHRR data of 1992-2003 for central Iran
Published 2011“…At the second phase, a seasonal-based classification algorithm for AVHRR (Advanced Very High Resolution Radiometer) data developed to enhance the classification accuracy. …”
Get full text
Get full text
Thesis -
14
Cyber hygiene during Covid-19 to avoid cyber attacks
Published 2022“…Five hypotheses were developed in hopes of identifying the relationship between the factors and cyber hygiene behavior. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Semantic-Based Scalable Decentralized Resource Discovery
Published 2010“…DA describes resource capabilities, and RA carries resource requests that are needed for some applications. We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
16
Analyzing customer reviews for ARBA Travel using sentiment analysis
Published 2025“…Key phrases are extracted from 400 customer reviews on Google Reviews and 300 from Facebook to reveal common themes in customer experiences. …”
Get full text
Get full text
Student Project -
17
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…The current most suitable security scheme for VANET is an Elliptic Curve Digital Signature Algorithm (ECDSA) asymmetric security mechanism. ECDSA is small in key size but it provides the same level of security as the large key sized scheme. …”
Get full text
Get full text
Thesis -
18
Optimization of flood inundation simulation using multi-resolution Digital elevation model
Published 2022“…Up until now, optimization studies of DEM resolution with flood inundation distribution relationship is scarce. This is one of the key components of flood phenomenon which requires high accuracy for further action in the flood risk management. …”
Get full text
Get full text
Thesis -
19
Relationship between tiktok usage and youth well-being involving personality characteristics
Published 2022“…By creating a content ecology and recommendation power through algorithms, TikTok enables users with similar interests to expand their social relationships through content sharing, becoming a key trend in social media video applications in China. …”
Get full text
Get full text
Thesis -
20
Novel insight into the structural requirements of P70S6K inhibition using group-based quantitative structure activity relationship (GQSAR) (GQSAR)
Published 2014“…The current study employed a group-based quantitative structure-activity relationship (GQSAR) to develop global QSAR models capable of predicting the bioactivity of P70S6K inhibitors. …”
Get full text
Get full text
Get full text
Article
