Search Results - (( iot applications tree algorithm ) OR ( _ ((application use) OR (application using)) algorithm ))

Refine Results
  1. 1
  2. 2

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.…”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail by Ismail, Muhammad Alif Fauzan

    Published 2021
    “…In conclusion this paper is to develop a product recommender in marketplace mobile application using Collaborative Filter and the accuracy of the algorithm is measured using Mean Absolute Error…”
    Get full text
    Get full text
    Thesis
  8. 8

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Application of genetic algorithm method to optimize flow shop sequencing problem as the title of this project is the study about the method used in order to optimize flow shop sequencing problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi by Mohd Rafi, Hafifi

    Published 2012
    “…There is several algorithms use in sequencing of DNA fragment. This paper presents a study on design and analysis of construction and recombination module using IduryWaterman algorithm and fragment assembly application using Verilog. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…However, for optimum distance, dijkstra algorithm has been used. This algorithm is one of the algorithms used for getting the lowest cost search path. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…By contrast, the results of the safe path selection model were compared with the results obtained using Dijkstra's algorithm and the Floyd-Warshall algorithm. …”
    thesis::doctoral thesis
  16. 16
  17. 17

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    loformation Retrieval - using Porter Stemming Algorithm by Zulkifly, Zurida Azita

    Published 2006
    “…By implementing the algorithm, it is expected from the application to retrieve only documents that relevant to the users query.…”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…This paper reports the power fill techniques using GA in scheduling. Class timetabling problem is one of the applications in scheduling. …”
    Get full text
    Get full text
    Get full text
    Thesis