Search Results - (( using certification based algorithm ) OR ( java application search algorithm ))

Refine Results
  1. 1

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  2. 2

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Evolutionary Music; Composing Beats and Chords Progression by Ng, Hayden

    Published 2020
    “…Evoluthm utilizes Harmony Search Algorithm and JFUGUE techniques in compliances with artificial intelligence (AI). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hybrid genetic algorithm for improving fault localization by Mahamad Zakaria, Muhammad Luqman, Sharif, Khaironi Yatim, Abd Ghani, Abdul Azim, Koh, Tieng Wei, Zulzalil, Hazura

    Published 2018
    “…Therefore, there is a need for a technique which able to localize a fault effectively with less number of mutants generated. Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil by Jamil, Nur Syafiqah

    Published 2021
    “…Meanwhile, experiments using five common algorithms, Random Forest Regressor Model outperforms four (4) other algorithms in predicting the price of green building condominium, by training and validating the data-set using Split approach. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Exploring classification for sentiment analysis from halal based tweets by Setik, Roziyani, Raja Lope Ahmad, Raja Mohd Tariqi, Marjudi, Suziyanti

    Published 2021
    “…The classification was performed based on Malaysia halal certification scheme for each tweet to acquire the class label's frequency value based on the sentiment analysis process's polarity results. …”
    Get full text
    Get full text
    Other
  16. 16

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Household overspending model amongst B40, M40 and T20 using classification algorithm by Zulaiha Ali, Othman, Azuraliza, Abu Bakar, Nor Samsiah, Sani, Jamaludin, Sallim

    Published 2020
    “…The results show that the decision tree through J48 algorithm has produced the easiest rule to be interpreted. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…The predictive model is used to forecast the severity level of a person who is infected with COVID-19 virus based on his various symptoms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…The system’s functionality based on the use case and usability tested by the Human Resources expert has been tested to evaluate its system requirements. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad... by Ahmad, Nurul Atirah, Abu Samah, Khyrina Airin Fariza, Ahmad Kushairi, Nuwairah Aimi

    Published 2023
    “…The system’s functionality based on the use case and usability tested by the Human Resources expert has been tested to evaluate its system requirements. …”
    Get full text
    Get full text
    Book Section