Search Results - (( pattern grading based algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms by Al-Rawashdeh, Mohammad, Al Nawaiseh, Moh’d, Yousef, Isam, Bisharah, Majdi, Alkhadrawi, Sajeda, Al-Bdour, Hamza

    Published 2024
    “…The optimized models classified building damage grades with an AUROC of 0.9952. Comparing machine learning algorithms yields insights. …”
    Get full text
    Get full text
    Article
  3. 3

    Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using k-Nearest Neighbour (k-NN) by Mohamad Hushnie, Haron, Nur Azzimah, Zamri, Khairunisa, Muthusamy

    Published 2023
    “…Next, the grades of concrete were classified using a machine learning algorithm named k-Nearest Neighbour (k-NN). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using kNearest Neighbour (k-NN) by Mohamad Hushnie, Haron, Nur Azzimah, Zamri, Khairunisa, Muthusamy

    Published 2023
    “…Next, the grades of concrete were classified using a machine learning algorithm named k-Nearest Neighbour (k-NN). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    MELODY TRAINING WITH SEGMENT-BASED TILT CONTOUR FOR QURANIC TARANNUM by Hanum, H.M., Abas, L.H.M., Aziz, A.S., Bakar, Z.A., Diah, N.M., Ahmad, W.F.W., Ali, N.M., Zamin, N.

    Published 2021
    “…A tarannum training prototype is built to test similarity between a userâ��s recitation and the trained patterns. To identify similarity between a pair of verse-contours, the application employs a shape-based contour similarity algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining by Dian Sa’adillah Maylawati

    Published 2023
    “…First, this study combines SPM with Sentence Scoring method as feature-based approach and Bellman-Ford algorithm as graph-based to validate the performance of SPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Spatial-temporal analysis using two-stage clustering and GIS-based MCDM to identify potential market regions by Ernawati, Kamal Baharin, Safiza Suhana, Kasmin, Fauziah

    Published 2021
    “…Subsequently, the origin schools' regencies/cities were clustered using the k- prototypes algorithm based on their time-series pattern category, the consistency in sending students, average cumulative grade point average (CGPA), and dropout (DO) rate. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12