Search Results - (( development communication conversion algorithm ) OR ( java binary classification algorithm ))
Search alternatives:
- development communication »
- communication conversion »
- binary classification »
- conversion algorithm »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
3
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
4
Embodied conversational agents for H5N1 pandemic crisis
Published 2007“…A Crisis Communication Network, called CCNet, is established based on a novel algorithm incorporating natural language query and embodied conversation agent simultaneously. …”
Get full text
Get full text
Get full text
Article -
5
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
6
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
7
Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini
Published 2023“…For the recognized sign language gesture, the algorithm creates a bounding box with a label. The hand signs are then translated into words, allowing medical staff to clearly understand the conversation. …”
Get full text
Get full text
Thesis -
8
-
9
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
10
A Malay Chatterbot
Published 2005“…In this paper, the author presents an approach to develop a chatterbot, A Malay-Intelligence Response Application (A.M.I.R.A) that will be able to communicate or converse in Bahasa Melayu. …”
Get full text
Get full text
Final Year Project -
11
Automate customer support handling E-Commerce enquiry using ChatGPT
Published 2024“…The project scope is the development of a comprehensive mechanism for context handling, an inconspicuous human takeover process, and the summarization of entire conversations between customers and automated customer support before handover to human agents. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The rise of technology and the Internet has changed how people communicate in society and virtual counselling development since the 1970s. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…The process of securing the text is by using the 3Dimensional-Advanced Encryption Standard (3D-AES) block cipher algorithm. Android Studio software is used in developing the project. …”
Get full text
Get full text
Student Project -
14
Optical Packet Switching Contention Resolution Based On A Hybrid Wavelength Conversion-Fiber Delay Line Scheme
Published 2004“…Due to the convergence of computer communication and telecommunication technology, data traffic exceeds the telephony traffic. …”
Get full text
Get full text
Thesis -
15
Customer profiling using K-means clustering method / Nik Asyraniasna Nik Mohd Asri
Published 2024“…The end goal is to provide organizations with an effective tool that helps them better understand their customer segments, enabling them to develop more individualized and successful communication strategies in the context of a competitive market.…”
Get full text
Get full text
Thesis -
16
DEVELOPMENT OF REMOTE TERMINAL UNIT (RTU) FOR THE NEW FUNCTION OF DISTRIBUTION AUTOMATION SYSTEM (DAS)
Published 2012Get full text
Get full text
Conference or Workshop Item -
17
Role of AI in Combating and Perpetuating Fake News
Published 2024conference output::conference proceedings::conference paper -
18
Solar power inverter
Published 2013“…Communication capability is also included so that the user can control or monitor the inverter. …”
Get full text
Get full text
Undergraduates Project Papers -
19
-
20
