Search Results - (( java implementation tree algorithm ) OR ( program integration detection algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An optimal mesh algorithm for remote protein homology detection by M. Abdullah, Firdaus, M. Othman, Razib, Kasim, Shahreen, Hashim, Rathiah, Hassan, Rohayanti, Asmuni, Hishammuddin, Taliba, Jumail

    Published 2011
    “…This paper further presents the best combinations of multiple alignment and classification programs to be chosen. This paper also improves the quality of the multiple alignments via integration of a refinement algorithm. …”
    Get full text
    Get full text
    Article
  5. 5

    Fault detection with optimum March Test Algorithm by Zakaria, Nor Azura, Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Wen, Xiaoqing

    Published 2012
    “…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
    Get full text
    Conference or Workshop Item
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…Therefore, two automated procedures are developed to determine these parameters iteratively. The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S.M.M Yassin, S.M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which, the legal and illegal behaviours could identify. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Obstacles Avoidance Mobile Robot by Aminuddin, Mohammad Muzammil

    Published 2007
    “…The challenge is to integrate this algorithm with some hardware configuration in order to complete the project.…”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Coordinated Malware Eradication And Remediation Project (CMERP) by Abdollah, Mohd Faizal, S.M.M Yassin, S.M.Warusia Mohamed, Mas’ud, Mohd Zaki, Selamat, Siti Rahayu, Yusof, Robiah, Ahmad, Rabiah, Shahrin @ Sahibuddin, Shahrin

    Published 2019
    “…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which the legal and illegal behaviours could identified. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  18. 18
  19. 19

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A low cost and portable microwave imaging system for breast tumor detection by Izzat, Zainal Abidin.

    Published 2017
    “…The signal loss data will be gathered and will be integrated with breast cancer imaging algorithms.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD