Search Results - (( intelligence valid tree algorithm ) OR ( intelligent system rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7
  8. 8

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…Finally, the proposed algorithms were also validated on another dataset of a university campus in a different region. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Application of sampling-based motion planning algorithms in autonomous vehicle navigation by Khaksar, Weria, Mohamed Sahari, Khairul Salleh, Tang, Sai Hong

    Published 2016
    “…The performance of the proposed method is tested through simulation in different scenarios and also by comparing the performances of RRT and RRT* algorithms. The proposed method provides near-optimal solutions with smaller trees and in lower running time.…”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…This experiment used five common machine learning algorithms namely 1) Linear Regressor, 2) Decision Tree Regressor, 3) Random Forest Regressor, 4) Ridge Regressor and 5) Lasso Regressor tested on a real estate data-set of covering Kuala Lumpur District, Malaysia. 3 set of experiments was conducted based on the different feature selections and purposes The results show that the implementation of 16 variables based on Experiment 2 has given a promising effect on the model compare the other experiment, and the Random Forest Regressor by using the Split approach for training and validating data-set outperformed other algorithms compared to Cross-Validation approach. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Intelligent grading of agarwood essential oil quality using artificial neural network (ANN) / Noratikah Zawani Mahabob by Mahabob, Noratikah Zawani

    Published 2022
    “…The training and validation of the ANN was based on optimization of its training parameters and guided by the convergence of the mean squared errors (MSE). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih by Ahmed Abuluaih, Saajid Akram

    Published 2019
    “…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing fairness and efficiency in teacher placement based on staff placement model: an intelligent teacher placement selection model for Ministry of Education Malaysia by Shamsul Saniron, Zulaiha Ali Othman, Abdul Razak Hamdan

    Published 2025
    “…The effectiveness of ITPS was evaluated using five machine learning algorithms: J48, Decision Tree, Naïve Bayes, Random Forest, and K-Nearest Neighbors. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Modeling of static and dynamic components of bio-nanorobotic systems by Gavgani, Hamidreza Khataee

    Published 2012
    “…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
    Get full text
    Get full text
    Thesis
  20. 20

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
    Article