Search Results - (( user validation study algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…This study provides a text extraction algorithm for web text classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Influence maximisation towards target users on social networks for information diffusion by Temitope, Olanrewaju Abdus-Samad, Ahmad, Rahayu, Mahmuddin, Massudi

    Published 2018
    “…Influence maximisation has been an area of active research in recent years.This study aims to extend the fundamental influence maximisation problem (IMP) with respect to a set of target users on a social network.It is important to aim at the target users to speed up the rate of information diffusion and reduce the information diffusion cost.In doing so, the MITU algorithm was formulated and compared with state of the art algorithms.Publicly available datasets were used in validating the proposed algorithm.It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%.The influence overlap problem was equally identified in the heuristic algorithm where the seed set size was reduced by an average of six times.Furthermore, the random influencer selection identifies target nodes better than the betweenness and PageRank centralities.The findings could help organisations to reach target users on social media in the shortest cycle.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Influence maximization towards target users on social networks for information diffusion by Temitope, Olanrewaju Abdus-Samad, Ahmad, Rahayu, Mahmuddin, Massudi

    Published 2018
    “…In doing so, the MITU algorithm was formulated and compared with state of the art algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…In terms of artifact, this study yields AVOMP design guidelines that are comprised of UI design and interactivity aspects as well as AVOMP prototype of sorting algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A pilot study on the validation of vis-screen mobile application for vision test by Abdul Mutalib, Othman, Nyi Nyi, Naing, Atif Amin, Baig

    Published 2020
    “…This pilot study revealed the application is highly potential to be a valid and reliable tool for vision screening in the community.…”
    Get full text
    Get full text
    Article
  12. 12

    Interactive framework for dynamic modelling and active vibration control of flexible structures by Mat Darus, Intan Zaurah, Mohd. Hashim, Siti Zaiton, Tokhi, M. O.

    Published 2008
    “…This paper presents the implementation of an interactive learning environment for dynamic simulation and active vibration control of flexible structures. The study attempts to facilitate the learning process of the subject area through the development of an interactive environment that can help users to simulate and visualise the behaviour of flexible structures with given physical characteristics, and to test and validate controller designs. …”
    Get full text
    Get full text
    Article
  13. 13

    Trend analysis of software engineering scientific publications by Tengku Nadzirah, Tengku Majani

    Published 2019
    “…The estimation of the future trend is done by development of the algorithm linear regression algorithm in Matlab. With data collected from the main Science Direct database with of Software Engineering keywords, validation of the proposed algorithms on the case study was done. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The system will automatically check for the nearest vacant bay and reserve it for the current user allowing a different bay reservation for the next user. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…Additionally, it reduces outage probability by 25% and 10% relative to OMA and existing NOMA algorithms, respectively. These results validate the algorithm's robustness, particularly under imperfect CSI conditions, where traditional methods often fail. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Development and validation of promoter prediction system for recombinant lipase expression in Pichia pastoris by Gogo, Mayaki Fatima

    Published 2017
    “…A user interface was provided for LipExPS. ARM lipase was used to validate the LipExPS. …”
    Get full text
    Get full text
    Thesis
  18. 18

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…The main problem in traditional cryptosystem is a public key in determining validity, but this problem can be solved by identity based cryptography, where the public key can be obtained from users of public information known users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…To validate the effectiveness of the pro posed algorithm, it was tested via simulation using real datasets. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Grammarcheck: a dynamic LL (1) grammar checker using recursive descent parsing with chatbot assistance by Roselan, Nur Athirah Arami, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…The application includes an automated checking feature to assist users in verifying their steps and answers. It provides solutions for valid LL (1) grammars through a structured, step-by-step process, offering feedback on correct, incomplete, or incorrect answers. …”
    Get full text
    Get full text
    Get full text
    Article