Search Results - (( making based based algorithm ) OR ( java application learning algorithm ))

Refine Results
  1. 1

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Biogeography based optimization (BBO) algorithm to minimise non-productive time during hole-making process by Tamjidy, Mehran, Paslar, Shahla, Baharudin, B. T. Hang Tuah, Tang, Sai Hong, Mohd Ariffin, Mohd Khairol Anuar

    Published 2015
    “…Tool path optimization in today’s manufacturing systems is one of the crucial issues in holes-making machining. This paper presents an evolutionary optimization algorithm based on geographic distribution of biological organism to deal with hole-making process problem. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An Interval-Valued Fuzzy Soft Set Based Decision Making Approach Considering Weight by Hongwu, Qin, Ma, Xiuqin

    Published 2014
    “…The algorithm to solve fuzzy decision making problems based on interval-valued fuzzy soft sets has been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Enhanced Bandwidth Based Handover Decision Making Algorithm For Small Cell Wireless Networks by Chung, Seng Kheau, Chua, Bih Lii, Mark Irwin Goh, Syed Shajee Husain, Yew, Hoe Tung, Abbas Ibrahim Mbulwa

    Published 2020
    “…To overcome this problem, this paper proposed a new handover decision making algorithm that integrates the traveling distance prediction technique with the bandwidth based handover algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions by Ting Kien Hua, Noraini Abdullah

    Published 2020
    “…All Possible Path Algorithm (APPA) was another algorithm that was also used to rank all the alternatives path based on multiple criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Application of induced preorderings in score function-based method for solving decision-making with interval-valued fuzzy soft information by Ali, Mabruka, Kilicman, Adem, Khameneh, Azadeh Zahedi

    Published 2021
    “…Currently, there are three interval-valued fuzzy soft set-based decision-making algorithms in the literature. …”
    Get full text
    Get full text
    Article
  17. 17

    Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm) by Abd Razak, Nuur Farhani

    Published 2017
    “…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis by Mukhlis, Siti Farah Najwa

    Published 2017
    “…The results of this project is a Dam Haji game using A* algorithm which it is able to make legal movements based on the game’s rules and a matchup with a computer-based player that have gone through a process of computer learning to make movement based on the A* shortest path technique. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This method makes a tradeoff between token-based and permission-based. …”
    Get full text
    Get full text
    Thesis