Search Results - (( program implementation some algorithm ) OR ( parametric classification using algorithm ))

Refine Results
  1. 1

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…Nevertheless, AC is not required for LCM if the original multi-spectral image is used. The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques by Kayalvily, Tabianan, Denis, Arputharaj, Mohd Norshahriel, Abd Rani, Sarasvathi, Nahalingham

    Published 2022
    “…This study aims to predict the ratings of Google Play Store apps using decision trees for classification in machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Generalized derivations and automorphisms of some classes of algebras by Adamu, Abdulkadir

    Published 2019
    “…In the Leibniz algebra case, we had eight subspaces too, with different structures, it includes two one-parametric sets as well. Furthermore, by using the two one-parametric sets, two invariant functions are de- fined. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Application of Decision Trees in Athlete Selection: A Cart Algorithm Approach by Riska Wahyu, Romadhonia, A'yunin, Sofro, Danang, Ariyanto, Dimas Avian, Maulana, Junaidi Budi, Prihanto

    Published 2023
    “…The focus of this study is on the use of DTs, employing the Classification and Regression Trees (CART) algorithm, in the initial screening of athletes. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of an autonomous mobile robot navigation algorithm using C language by Subra Mullisi, Shafeq Marwan

    Published 2009
    “…The objective of the project is to develop navigation algorithm for the autonomous mobile robot. After that, implement the navigation algorithm on the mobile robot and without using the external sensor for navigation of the mobile robot to reach the specified point. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Comparison of Some Numerical Methods for Solving Real-Life Nonlinear Equations by Using Python Programming / Annie Gorgey ... [et al.] by Gorgey, Annie, Zulkifly, Zul Hafiezy, Hassim, Haslinah, Azim, Farah Adilla

    Published 2024
    “…The study suggests extending investigations to Algorithm 1 refinement, comparative studies on various equation types, exploration of hybrid methods, real-world application and validation, and user-friendly implementation.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…The experimental results are also thoroughly evaluated and verified via non-parametric statistical analysis. Based on the obtained experimental results, the OGC, DPSO, and VDEO frameworks achieved an average enhancement up to 24.36%, 9.38%, and 11.98% of classification accuracy, respectively. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Ray Casting for Iso-surface in Volumetric Data by Ngoc Anh, Do Hoang

    Published 2005
    “…It is opento improve for implementation on multiprocessors. The thesis will compare some existing algorithms for ray casting in terms of image quality, computing time, complexity and so forth. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Novel voice activity detection based on cepstrum moments by Farzan, Ali, Nourmohammadi, Ali, Mashohor, Syamsiah, Sadra, Sarvin

    Published 2010
    “…In this paper we propose a novel statistical VAD algorithm using Cepstrum coefficients and their moments as features for classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Security analysis of blowfish algorithm by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item