Search Results - (( java implementation tree algorithm ) OR ( usage (patterns OR pattern) machine algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2
  3. 3

    Analyzing UiTMCTKKT vehicle utilization and travel pattern using predictive analytics by Syed Mohamad, Sharifah Masyitah

    Published 2025
    “…Two key experiments were conducted using machine learning models. The Experiment 1 focused on classifying vehicle types based on utilization and Experiment 2 involved predicting no of trips per day using classifiers such as Random Forest, Decision Tree, and Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Student Project
  4. 4

    Forecast innovative development level in green supply chains using a comprehensive fuzzy algorithm by Delgoshaei, Aidin, Beighizadeh, Razieh, Mohd Arffin, Mohd Khairol Anuar, Leman, Zulkiflle, Ali, Ahad

    Published 2022
    “…The outcomes demonstrate the superiority of the Support Vector Machine algorithm in terms of achieved maximum score and minimum error. …”
    Get full text
    Get full text
    Article
  5. 5

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…More recently, cyber-attacks have also been on the rise and SQL injection attacks are some of major threats to data security. AI and machine learning have come a long way, however their usage in cybersecurity is still somewhat nascent. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…In High-performance Computing (HPC) applications, the resource usage pattern varies over time, making it challenging to track resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…As artificial intelligence (AI) is a very wide subject, two specific areas are chosen to illustrate the practical usage of machine learning frame-works. For the first part, intelligence embedded system has been utilised to improve performance and .secondly, tackling the issues in games and gamification technology. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A review on classifying and prioritizing user review-based software requirements by Salleh, Amran, Said, Mar Yah, Osman, Mohd Hafeez, Hassan, Sa’Adah

    Published 2024
    “…Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  14. 14

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Advancing literary analysis with Python: a comprehensive study of simile detection and classification in the translation of Al-Abrat by Al Zahrawi, Rasha Talal, Syed Abdullah, Syed Nurulakla, Sarirete, Akila, Abdullah, Muhammad Alif Redzuan

    Published 2025
    “…Key findings reveal distinct patterns in simile usage, particularly the prevalence of perceptible-perceptible and cognitive-cognitive categories, emphasizing the role of figurative language in fostering thematic and emotional engagement. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Comparative analysis for topic classification in juz Al-Baqarah by Rahman, Mohamad Izzuddin, Samsudin, Noor Azah, Mustapha, Aida, Abdullahi Oyekunle, Adeleke

    Published 2018
    “…The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of a simulation-based decision support model for high precision component manufacturer by Gan, Sin Yi

    Published 2013
    “…In such configurations, a job may undergo operations only in certain orders of machines and not necessarily at every machine. The complexity is further compounded by the indefinite batch size for each product. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18