Search Results - (( developing visualization mining algorithm ) OR ( ais implementation using algorithm ))
Search alternatives:
- developing visualization »
- visualization mining »
- implementation using »
- ais implementation »
- mining algorithm »
- using algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
3
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
4
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
5
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
6
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
7
Application of minimax algorithm in dots and boxes game
Published 2025“…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
9
Car dealership web application
Published 2022“…In this project, a web application and a web service were proposed and implemented. The used car dealership web application was implemented with ASP.NET Core. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Stock price monitoring system
Published 2024“…Consequently, Root Mean Squared Error (RMSE) and Mean Absolute Percentage Error (MAPE) are used to evaluate the performance of the prediction algorithms. The methodology used in this project is Cross-Industry Standard Process for Data Mining (CRISP-DM), which is a common standard for data mining projects. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Active intelligent control of vibration of flexible plate structures
Published 2011“…The approach is realised within SISO and SIMO AVC structures using RCGA, PSO and AIS algorithms. These are implemented on the flexible plate structure with various disturbance signals. …”
Get full text
Get full text
Thesis -
12
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
13
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
Get full text
Get full text
Thesis -
14
-
15
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…These problem can be solved using AI technology. Reinforcement is the process of strengthening an army and it is a crucial issue in gaming design as well. …”
Get full text
Get full text
Get full text
Thesis -
16
Fuzzy Soft Set Clustering for Categorical Data
Published 2024Get full text
Get full text
Get full text
Get full text
Article -
17
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
18
Data mining and analysis for predicting electrical energy consumption
Published 2024“…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
Article -
19
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…Based on this, the research employ a linear regression technique in the AI penetration testing. This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
20
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018“…The weights and biases generated through the training process is depended on the training algorithm, initial weights and biases for training and the dataset used in the process. …”
Get full text
Get full text
Monograph
