Search Results - (( java implication based algorithm ) OR ( using cross study algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Phylogenetic tree classification system using machine learning algorithm by Tan, Jia Kae

    Published 2015
    “…A study is conducted to develop an automated phylogenetic tree image classification system by using machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4
  5. 5

    Cross-project software defect prediction by Bala, Yahaya Zakariyau, Abdul Samat, Pathiah, Sharif, Khaironi Yatim, Manshor, Noridayu

    Published 2022
    “…Through this work, it was discovered the majority of the selected studies used machine learning techniques as classification algorithms, and 64% of the studies used the combination of Object-Oriented (OO) and Line of Code (LOC) metrics. …”
    Get full text
    Get full text
    Article
  6. 6

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing by Hamzah N.A., Jaaz Z.A., Al-Bakri N.F., Tawfeq J.F., Radhi A.D.

    Published 2024
    “…The SIFT algorithm has some drawbacks and is currently widely used because of its overall efficiency, although the efficiency of a single collection is slow. …”
    Conference Paper
  9. 9

    Eccentricity Optimization of NGB System by using Multi-Objective Genetic Algorithm by Yazdi, H.M., Ramli Sulong, N.H.

    Published 2009
    “…In this study, a new method for designing a particular braced system by using multi-objective genetic algorithm is proposed. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Fault localization on power cables using time delay estimation of partial discharge signals by Chin, Kui Fern, Chai, Chang Yii, Asfarina Abu Bakar, Ismail Saad, Kenneth Teo Tze Kin, Megat Muhammad Ikhsan Megat Hasnan, Nur Aqilah Mohamad

    Published 2023
    “…The researchers employ the time difference of arrival (TDoA) algorithm to compute PD location using the double-end PD location algorithm, where the PD location precision serves as an indicator of the accuracy of the time delay estimation methods. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A comparative study of the classification of skin burn depth in human by Kuan, Pei Nei, Li, Stephanie Chua Hui, Ehfa, binti Bujang Safawi, Wang, Hui Hui, Tiong, Wei King

    Published 2017
    “…The dataset was evaluated using both a supplied test set and 10-fold cross validation methods. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A genetic algorithm based student attendance management system with biometric identification / Mohammad Hanif Rashid by Rashid, Mohammad Hanif

    Published 2014
    “…We have incorporated Generic Algorithm (GA) in one stage of the system. The importance of using the Genetic Algorithm is to find the best fingerprints after going through all processes of selection, cross-over and mutation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Regression study for thyroid disease prediction Comparison of crossing-over approaches and multivariate analysis by Ong, Song Quan, Pradeep Isawasan, Khairulliza Ahmad Salleh

    Published 2022
    “…Our result shows that models that use kfold cross-validation have greater performance, and a higher number of k does not improve the model performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A Comparison Study On Pca_Modular Pca And Lda For Face Recognition by Cheah, Boon Wah

    Published 2017
    “…The performance of these face recognition algorithms will be evaluated by 10-fold cross validation using ORL database. …”
    Get full text
    Get full text
    Monograph
  16. 16

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…Nine features which are Age, Blood pressure, Skin thickness, Glucose, Diabetes pedigree function, Pregnancy, BMI, Insulin level, and Outcome been used for the prediction of diabetes. The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…Hence, the issue of cross-content type, i.e., screen-content images (SCIs) and natural-scene images (NSIs), image quality assessment is the main objective of this study. …”
    Get full text
    Thesis
  18. 18

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance evaluation of caching placement algorithms in named data network for video on demand service by Abbas, Rasha Salem

    Published 2016
    “…There are two stages of activities resulted in the outcome of the study: The first is to determine the causes of delay performance in NDN cache algorithms used in VoD workload. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article