Search Results - (( mobile validation study algorithm ) OR ( early identification method algorithm ))*

Refine Results
  1. 1

    Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues by Aisyah, Yunus, Norfilza, Mohd Mokhtar, Raja Affendi, Raja Ali *, Siti Maryam, Ahmad Kendong, Hajar, Fauzan Ahmad

    Published 2024
    “…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Dynamic path planning algorithm in mobile robot navigation by Yun, S.C., Parasuraman, S., Ganapathy, V.

    Published 2011
    “…This study is focused on exploring the algorithm that avoids acute obstacles in the environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…Students can watch and observe through the elaboration of dynamic animation. Previous studies show that AV mobile study is still limited. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model by Norhaida, Hussain, Wai Shiang, Cheah

    Published 2022
    “…As reported in many studies, real drill experiments have been conducted to validate the mobile crowd steering application. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation by Illias, Hazlee Azil, Wee, Zhao Liang

    Published 2018
    “…It was found that the proposed hybrid SVM-Modified EPSO (MEPSO)-Time Varying Acceleration Coefficient (TVAC) technique results in the highest correct identification percentage of faults in a power transformer compared to other PSO algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…First, to investigate the methods used to address limitations associated with microbiome-based datasets in colorectal cancer identification using deep neural network algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING by DEMPI, CHRISTIE BANGI

    Published 2018
    “…There is a need to develop a low cost automatic corrosion damage identification. This project focuses on early detection of pipelines and gas tanks corrosion in oil and gas. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Analysis of banana plant health using machine learning techniques by Thiagarajan, Joshva Devadas, Kulkarni, Siddharaj Vitthal, Jadhav, Shreyas Anil, Waghe, Ayush Ashish, Raja, S.P., Rajagopal, Sivakumar, Poddar, Harshit, Subramaniam, Shamala

    Published 2024
    “…Recent research emphasizes the imperative nature of addressing diseases that impact Banana Plants, with a particular focus on early detection to safeguard production. The urgency of early identification is underscored by the fact that diseases predominantly affect banana plant leaves. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…The validation results show that Random Forest with 10-folds cross validation spitting dataset achieved 8 highest performance compared to benchmark study and two other classifiers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. Most methods in the early work that detects outliers independently have been developed in field of Statistics. …”
    Get full text
    Get full text
    Conference or Workshop Item