Search Results - (( java machine learning algorithm ) OR ( post implementation using algorithm ))
Search alternatives:
- implementation using »
- post implementation »
- learning algorithm »
- using algorithm »
- java machine »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This work employed the use of machine learning approach. Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
Get full text
Get full text
Get full text
Thesis -
2
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…These chatbots support learning of Java via problem-solving steps through “learning by doing”. …”
Get full text
Get full text
Conference or Workshop Item -
3
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
4
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. …”
Get full text
Get full text
Get full text
Article -
5
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…While numerous methods have been proposed, machine learning (ML) is the most popular approach that has been applied across the globe. …”
Conference Paper -
6
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Crosssover-first different evolution: a comprehensive post- Hoc analysis
Published 2017“…Explore a new evolutionary optimization approach using Crossover-First Differential Evolution. Implementation details explained clearly with a comprehensive post-hoc statistical analysis to support the algorithm. …”
Get full text
Get full text
Book -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
11
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…The method builds upon an approach of the open source visualization software VTK where the data visualizer program ParaView is freely available. By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
Get full text
Get full text
Thesis -
12
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
Get full text
Get full text
Thesis -
13
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
15
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…The shortest path routing is one of the well-known network analysis techniques implemented in road management systems. Pg Routing as an extension of Postgre SQL/Post GIS database is an open source library that implements the Dijkstra shortest path algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
17
Application of artificial neural network for automatic contingency analysis in power security assessment / Ismail Musirin and Titik Khawa Abdul Rahman
Published 2006“…Data were generated using the newly developed automatic contingency analysis and ranking (ACAR) algorithm. …”
Get full text
Get full text
Get full text
Article -
18
A Survey of metaheuristic approaches for curriculum based course timetabling problem
Published 2017“…The review of available approaches in solving CBCTT problem in this paper produces information that can be used for future development and experimentation such as number of instances that should be used, neighborhood structure(s) that can be applied and number of experiment repetitions.As stated by Wolpert & Macready (1997) that there is no unique ‘best’ algorithm which performs better than any other algorithm on every test problem (data instance), hence, this paper provides guidelines for future investigation on solving CBCTT problem using other metaheuristic techniques or approaches.…”
Get full text
Get full text
Conference or Workshop Item -
19
Techniques and strategies to minimize radiation exposure in pediatric computed tomography (CT) abdominal examinations: a review
Published 2024“…To reduce the ionizing radiation dose while still obtaining high-quality diagnostic images, healthcare practitioners should adhere to DRL, adjust exposure factors, implement prefiltration, employ AI, and use post-processing algorithms.…”
Get full text
Get full text
Get full text
Article -
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article
