Search Results - (( _ application ((out algorithm) OR (bayes algorithm)) ) OR ( code application use algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun by Che Harun, Nurul Sarah Aliessa

    Published 2025
    “…This study used the Naive Bayes algorithm to analyse airline reviews and customer feedback, resulting in improved service quality. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes by Yee, Cong Kai

    Published 2019
    “…Three experiments were carried out to: (i) verify the applicability of the algorithms used in the proposed single-frame profilometry system; (ii) verify the applicability of the proposed phase error compensation algorithm; and (iii) compare the result of the proposed profilometry against the Mitutoyo CRYSTA-Plus M Series 196 coordinate-measuring machine (CMM). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Phishing image spam classification research trends: Survey and open issues by John Abari, Ovye, Mohd Sani, Nor Fazlida, Khalid, Fatimah, Mohd Yunus Bin Sharum, Mohd Yunus, Mohd Ariffin, Noor Afiza

    Published 2020
    “…A phishing email is an attack that focused completely on people to circumvent existing traditional security algorithms. The email appears to be a dependable, appropriate, and solid communication medium for internet users. …”
    Get full text
    Get full text
    Article
  11. 11

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Classifying good and bad websites by Koo, Ee Woon

    Published 2015
    “…The classification process is made easy by using set of features generated from HTML codes. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13
  14. 14
  15. 15
  16. 16

    Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure. by Djojodihardjo, Harijono, Jamali, Hamed, Shokrani, Alireza, Mustapha, Faizal, Zahari, Rizal, Wiriadidjaja, Surjatin

    Published 2012
    “…Further simulations are carried out using commercial codes for some sample applications to explore impact resilient structural characteristics in the elastic region.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19
  20. 20

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
    Get full text
    Get full text
    Thesis