Search Results - (( data implication from algorithm ) OR ( peer evaluation method algorithm ))

Refine Results
  1. 1
  2. 2

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Two sets of real-time data are presented in this work. The first one is related to the questionnaire data, consisting of 262 respondent samples, while the second set has 263 samples of pedestrian walking signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Two sets of real-time data are presented in this work. The first one is related to the questionnaire data, consisting of 262 respondent samples, while the second set has 263 samples of pedestrian walking signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20