Search Results - (( java application customization algorithm ) OR ( construct validity machine algorithm ))
Search alternatives:
- customization algorithm »
- construct validity »
- machine algorithm »
- java application »
-
1
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…In response to worsening urban traffic congestion, metro tunnels have emerged as a solution to ease pressure on road networks. Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. …”
Get full text
Get full text
Get full text
Thesis -
2
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
3
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023“…The transformed data is then modelled using machine learning algorithms such as Naïve Bayes classifier and Support Vector Machine to predict the overall sentiment of tweets, in which the finding depicted an overall positive sentiment surrounding the issue. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
An Arabic hadith text classification model using convolutional neural network and support vector machine / Mohd Irwan Mazlin
Published 2022“…Convolution Neural networks and support vector machines are two different algorithms applied to text classification. …”
Get full text
Get full text
Thesis -
6
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Iris data set has been taken from UCO machine learning to assist in testing phase. The validity of the result for this web tool will be determined by the average score of the silhouette method. …”
Get full text
Get full text
Thesis -
8
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
9
Predicting 30-day mortality after an acute coronary syndrome (ACS) using machine learning methods for feature selection, classification and visualization
Published 2021“…Feature selection methods such as Boruta, Random Forest (RF), Elastic Net (EN), Recursive Feature Elimination (RFE), learning vector quantization (LVQ), Genetic Algorithm (GA), Cluster Dendrogram (CD), Support Vector Machine (SVM) and Logistic Regression (LR) were combined with RF, SVM, LR, and EN classifiers for 30-day mortality prediction. …”
Get full text
Get full text
Get full text
Article -
10
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…Construction noise is an occupational noise that is potentially harmful, and it usually originates from earth-moving machines in construction sites. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Effective gene selection techniques for classification of gene expression data
Published 2005“…The proposed approach is validated using leave one out cross validation (LOOCV). …”
Get full text
Get full text
Thesis -
13
MODELLING ANALYSIS FOR ACCURATE TROPICAL WEATHER FORECASTING
Published 2023“…The Random Forest, K-Nearest Neighbors, Support Vector Machines, XGBoost and Naïve Bayes algorithm is proposed to validate the model for rainfall prediction, which is proven to operate well with excellent accuracy in previous researches. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Development of machine learning sentiment analyzer and quality classifier (MLSAQC) and its application in analysing hospital patient satisfaction from Facebook reviews in Malaysia
Published 2022“…By manually annotating many batches of randomly chosen reviews, we constructed a machine learning quality classifier (MLQC) based on the SERVQUAL model and a machine learning sentiment analyzer (MLSA). …”
Get full text
Get full text
Thesis -
15
Digital media-enhanced cultural brand development: creative strategies for urban identity construction
Published 2025“…A mixed-methods approach incorporated stakeholder surveys (n=420) across four participant groups, systematic analysis of 800 social media posts, examination of 35 institutional platforms, and comparative analysis of 12 international cities, utilizing an AI-enhanced analytical pipeline with natural language processing, computer vision, and machine learning algorithms. Five core creative strategy elements were empirically validated: digital storytelling integration, community-centered content creation, heritage-digital synthesis, interactive cultural experiences, and dynamic community feedback systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
17
-
18
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…First, the vibration signals of gear with different fault conditions were decomposed by a fourth-level discrete wavelet packet transform, and the statistical features at all constructed nodes were derived. Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
20
Utilizing machine learning techniques to predict the blood-brain barrier permeability of compounds detected using LCQTOF-MS in Malaysian Kelulut honey
Published 2023“…Compound permeability across the blood–brain barrier (BBB) is a key concern in central nervous system (CNS) drug development, and this limitation can be addressed by applying cheminformatics with codeless machine learning (ML). Among the four models developed in this study, the Random Forest (RF) algorithm with the most robust performance in both internal and external validation was selected for model construction, with an accuracy (ACC) of 87.5% and 86.9% and area under the curve (AUC) of 0.907 and 0.726, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article
