Search Results - (( data applications using algorithm ) OR ( data implication based algorithm ))
Search alternatives:
- applications using »
- data applications »
- implication based »
- data implication »
- using algorithm »
-
1
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
2
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
Get full text
Get full text
Thesis -
3
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…Therefore, this article presents a bibliometric analysis based on the topic of the root growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
5
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
Get full text
Get full text
Article -
6
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu
Published 2001“…Identification of students' algorithms has implications towards the teaching and learning activities and forms a basis in planning teaching strategies of multiplication involving decimals for mathematics educators.…”
Get full text
Get full text
Get full text
Article -
8
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
9
Agreement options for negotiation on material location decision of housing development
Published 2020“…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
Get full text
Get full text
Article -
10
Gender classification on skeletal remains: efficiency of metaheuristic algorithm method and optimized back propagation neural network
Published 2020“…Thus, this paper proposed metaheuristic algorithms such as Particle Swarm Optimization, Ant Colony Algorithm and Harmony Search Algorithm based feature selection to identify the most significant features of skeleton remains. …”
Get full text
Get full text
Get full text
Article -
11
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
Get full text
Get full text
Article -
12
Prediction of payment method in convenience stores using machine learning
Published 2023“…The Random Forest algorithm was employed due to its robustness in handling complex, high-dimensional data, and its ability to provide reliable predictions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Uncovering user perceptions toward digital banks in Indonesia: A Naïve Bayes sentiment analysis of twitter data
Published 2023“…The subsequent stages involved classification using the Naïve Bayes algorithm and word cloud visualization to identify the most commonly used words based on user responses. …”
Get full text
Get full text
Get full text
Article -
14
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
15
Artificial intelligence (AI) and its application in architecture design: a thematic review
Published 2025“…Data for this research encompassed a thematic review of 54 publications spanning from 2019 to 2023. …”
Get full text
Get full text
Get full text
Article -
16
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Reliability analysis, factor analysis, normality analysis, correlation analysis and regression analysis are used to analyze the amassed data. It can be discerned that the main software reusability approaches used in the IT industry include design patterns, component-based development and application frameworks. …”
Get full text
Get full text
Thesis -
17
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Today, most web applications are vulnerable to SQL-injection attacks. …”
Get full text
Get full text
Get full text
Article -
18
CO2 flow in saline aquifer with salt precipitation
Published 2016“…The random data are linearized to obtain the relationship between salt precipitate and CO2 saturation and implemented to the algorithm for two-phase flow in CO2 and brine system. …”
Get full text
Get full text
Article -
19
CO2 flow in saline aquifer with salt precipitation
Published 2016“…The random data are linearized to obtain the relationship between salt precipitate and CO2 saturation and implemented to the algorithm for two-phase flow in CO2 and brine system. …”
Get full text
Get full text
Article -
20
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
Published 2024“…The methodology incorporates data balancing through Hybrid Random Sampling, feature selection using the Gini Index, and a two-layer model explainability via Model-agnostic Explanations (LIME) and Shapley Additive Explanations (SHAP) techniques. …”
Get full text
Get full text
Get full text
Article
