Search Results - (( pattern classification protocol algorithm ) OR ( java general selection algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Prediction of sleep pattern for university students using machine learning by Widya, Muhammad Faishal Atha, Utoro, Rio Korio, Roedavan, Rickman, Soegiarto, Duddy, Moorthy, Kohbalan, Pratondo, Agus

    Published 2026
    “…Data was collected through an online survey of 286 respondents, covering features related to demographics, daily habits, and personal perceptions. The Random Forest algorithm was employed for classification, evaluated using a 5-Fold Cross-Validation protocol, and achieved an average accuracy of 81.46%. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Thesis
  6. 6

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd... by Sharifah Nabilah , Syed Mohd Hamdan

    Published 2024
    “…Sex and ethnicity estimation methods utilised in adult are less effective in sub-adults due to varied cranium patterns during growth. Therefore, this study aimed to develop three-dimensional (3D) craniometric models in Malaysian sub-adults for sex and ethnicity estimation, and to establish a cephalic index (CI) classification for Malaysian sub-adults. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16