Search Results - (( java implementation tree algorithm ) OR ( using agile method algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A review article on software effort estimation in agile methodology by Sudarmaningtyas, Pantjawati, Rozlina, Mohamed

    Published 2021
    “…Currently, Agile software development method has been commonly used in software development projects, and the success rate is higher than waterfall projects. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A review article on software effort estimation in agile methodology by Sudarmaningtyas, Pantjawati, Rozlina, Mohamed

    Published 2021
    “…Currently, Agile software development method has been commonly used in software development projects, and the success rate is higher than waterfall projects. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm by Nurnajmin Qasrina Ann, ., Pebrianti, Dwi, Mohammad Fadhil, Abas, Bayuaji, Luhur

    Published 2022
    “…Nowadays, encryption is one of the most popular and effective security methods used by company and organizations. A new hybrid technique, Lorenz chaotic system and an optimization algorithm, Simulated Kalman Filter (SKF) had been proposed to solve image encryption problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Time Domain Reflectometry Computational Technique Using Agilent Vee by Mohamed Dan, Nur Sharizan

    Published 2007
    “…All the measurements and calculations were implemented using transformation software developed using Agilent VEE version 6. …”
    Get full text
    Get full text
    Thesis
  10. 10

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…For this project, it will use Agile methodology that has five phases, which are requirement analysis phase, design phase, development phase, testing phase and maintenance. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…By using this algorithm, the web page is segmented into several big blocks. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    The classification of FTIR plastic bag spectra via label spreading and stacking by Almanifi, Omair Rashed Abdulwareth, Ng, Jee Kwan, Anwar P. P., Abdul Majeed

    Published 2021
    “…Four pipelines were investigated, consisting of two machine learning algorithms, a stacked model that stacks the KNN, SVM and RF algorithms together, and Label spreading, as well as two different dimensionality reduction methods namely; SVD and UMAP. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Development of real-time navigation system by using pure pursuit guidance for unmanned surface vehicle by Putri Nur Farhanah, Mohd Shamsuddin

    Published 2024
    “…This research aims to create a real-time tracking algorithm for guiding the USV to the target using the Pure Pursuit method, and to test how well it reduces sideways errors and reaches the target. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Smart Attendance: Automated Face Recognition System During Final Examination in UTP by Paramasivam, Puniswary

    Published 2019
    “…This project is planned to be designed using Agile methodology. Besides, feature extraction of students’ face is expected to utilize the machine learning in order to ease the development process. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Personalized job recommender system using content-based filtering for UiTM Machang graduates by Rosli, Norhalili

    Published 2025
    “…The System Usability Scale (SUS) and User Acceptance Testing (UAT) are used to evaluate the system’s usability because they are well-known and trusted methods for measuring user experience. …”
    Get full text
    Get full text
    Student Project
  20. 20

    A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic by Aabid, Abdul, Perveez, Bisma, Perveen, Nagma, Khan, Sher Afghan, Shabbir, Omar

    Published 2022
    “…Over the last two decades, unmanned aerial vehicles (UAV) or drones have become a vital tool with their enormous applications due to their versatility, agility, and applicability. On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
    Get full text
    Get full text
    Get full text
    Article