Search Results - (( variable creating process algorithm ) OR ( java application tree algorithm ))

Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    To study the multi-objective optimization of EDM using genetic algorithm by Fairuz, Idris

    Published 2013
    “…Development of EDM process has resulted in significant improvements in operating techniques, productivity and accuracy, which the result of this machining development has helped variability in EDM process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.…”
    Get full text
    Get full text
    Article
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
    Get full text
    Get full text
    Book Section
  11. 11

    Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih by Ahmed Abuluaih, Saajid Akram

    Published 2019
    “…For example, the framework of solving CSP imposes a complete permutation of assignments to all remaining variables in order to derive a valid model. The author argues in this study that the problem can be neutralised and it is not necessary to perform brute-force searching all the time if a search strategy could have guided the process to the level where the values of the remaining variables can be determined implicitly, creating what the author calls Solo-Path of assignments in the problem search tree.…”
    Get full text
    Get full text
    Thesis
  12. 12

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing by Muazu, Aminu Aminu, Hashim, Ahmad Sobri

    Published 2025
    “…The Harmony Search (HS) algorithm is a recent metaheuristic that mimics musicians’ improvisation to create pleasant compositions according to aesthetic standards widely used in different areas continuously adjusts solution variables to find the best outcome. …”
    Get full text
    Get full text
    Article
  17. 17

    The Determinant Factors for the Issuance of Central Bank Digital Currency (CBDC) in Malaysia using Machine Learning Framework by Normi Sham Awang, Abu Bakar, Norzariyah, Yahya, Norbik Bashah, Idris, Engku Rabiah Adawiah, Engku Ali, Jasni, Mohamad Zain, Erni Eliana, Khairuddin, Ahmad Firdaus, Zainal Abidin, Murtaj, Sheikh Mohammad Tahsin, Siti Sarah, Maidin

    Published 2024
    “…The overall CentralBank Digital Currency Project Index (CBDCPI) was selected as a target variable,while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation by Hossain M.S., Mohd Sidek L.B., Marufuzzaman M., Zawawi M.H.

    Published 2023
    “…Monthly releases are taken as the main objective variables and are essentially control the water deficit of the process. …”
    Article
  20. 20

    The determinant factors for the issuance of Central Bank Digital Currency (CBDC) in Malaysia using machine learning framework by Awang Abu Bakar, Normi Sham, Yahya, Norzariyah, Idris, Norbik Bashah, Engku Ali, Engku Rabiah Adawiah, Mohamad Zain, Jasni, Khairuddin, Erni Eliana, Zainal Abidin, Ahmad Firdaus, Murtaj, Sheikh Mohammad Tahsin, Maidin, Siti Sarah

    Published 2024
    “…The overall Central Bank Digital Currency Project Index (CBDCPI) was selected as a target variable, while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article