Search Results - (( using personal method algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Text based personality prediction from multiple social media data sources using pre-trained language model and model averaging by Christian, Hans, Suhartono, Derwin, Chowanda, Andry, Kamal Z., Zamli

    Published 2021
    “…To date, there are many algorithms that can be used to extract embedded contextualized word from textual data for personality prediction system; some of them are based on ensembled model and deep learning. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Overhead view based person counting using deep learning by Kaw, Chee Zhao

    Published 2022
    “…Third, the accurate tracking of each detected person is performed using the deep learning based tracking framework, known as DeepSORT. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…One of the common strategies used for solving scalability is clustering. However, the existing clustering algorithms do not take into consideration the news nature in clustering the news items. …”
    Get full text
    Get full text
    Thesis
  10. 10

    User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop by Akop, Muhammad Asyraf

    Published 2017
    “…The project will also use a two-step authentication method to improve the reliability of the authentication process. …”
    Get full text
    Get full text
    Student Project
  11. 11

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Autonomous person-following telepresence robot using monocular camera and deep learning YOLO by Mat Lazim, Izzuddin, Sakri, Ahmad Amin Firdaus, Mauzi, Suffian At-Tsauri, Sahrim, Musab, Ramli, Liyana, Noordin, Aminurrashid

    Published 2024
    “…Experimental results demonstrate that the TR can successfully follow a person using the proposed algorithm, thus highlighting its effectiveness for person-following tasks.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil by Jamli, Mohd Radhi Fauzan, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…The research endeavors to develop a web-based system specifically designed to create personalized university timetables for Universiti Teknologi MARA (UiTM) students using genetic algorithms, aiming to address the urgent need for a customizable timetable solution catering to the diverse scheduling requirements of both repeater and non-repeater students while optimizing course group selection to minimize conflicts and enhance scheduling flexibility. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Back in the days, before computers and IT were widely used, history matching was done manually by trial and error method, where personal judgment were very critical in undergoing such methodology. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19
  20. 20

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis