Search Results - (( model evaluation mining algorithm ) OR ( based instruction ((a algorithm) OR (_ algorithm)) ))*

Refine Results
  1. 1

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…There is no determination of relative important instruction in this policy. By removing this, based on the least recent, it might cause a potential delay in the future processing if the removed instruction depends on it. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Evaluation of data mining models for predicting concrete strength by Wong, Chuan Ming

    Published 2024
    “…These models are all evaluated with hyperparameter tuning and different feature selection techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Design of DNA sequence alignment accelerated system using 2-dimensional array and custom instruction on FPGA / Nur Dalilah Ahmad Sabri by Ahmad Sabri, Nur Dalilah

    Published 2018
    “…Thus, this research concentrates on the optimization techniques based on Custom Instruction (CI) and Rectangular Dimensional array (2D) that proposed on Smith-Waterman (SW) algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Data mining techniques for disease risk prediction model: A systematic literature review by Ahmad W.M.T.W., Ghani N.L.A., Drus S.M.

    Published 2023
    “…Decision making; Decision trees; Forecasting; Health care; Soft computing; Accuracy evaluation; Classification technique; Data mining algorithm; Descriptive analysis; Disease risks; Infectious disease; Risk prediction models; Systematic literature review; Data mining…”
    Conference Paper
  7. 7

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…The proposed 2D path planning algorithms, on the contrary, select a relatively smaller number of vertices using the so-called base line (BL), thus they are computationally efficient. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Energy efficiency of the bitcoin mining hardware and related blockchain technology by Noor Faiqah Izzati, Afandi

    Published 2018
    “…The research proposes new formula and algorithm which allows the evaluation of energy efficiency for the hardware of bitcoins mining. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Nazir, Faridah, Jano, Zanariah, Omar, Norliza

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This project is to design a smart and energy aware routing algorithm for the Internet of Mobile Things. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An Automated Summarization Assessment Algorithm for Identifying Summarizing Strategies by Abdi, A., Idris, N., Alguliyev, R.M., Aliguliyev, R.M.

    Published 2016
    “…Design/Results: This paper aims to propose an algorithm based on the combination of semantic relations between words and their syntactic composition to identify summarizing strategies employed by students in summary writing. …”
    Get full text
    Get full text
    Article
  18. 18

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…Every context requires its own customized text mining algorithms in order to achieve best results. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparative analysis of pseudocode and flowcharts in algorithm development among first-year computer science students by Julaihi, Satria Arjuna, Bohari, Zubaidah, Che Md Nor, Rumaizah, Abdul Talip, Abdul Hadi

    Published 2026
    “…Algorithm development is a fundamental skill in computer science education, yet students struggle to translate problemsolving into structured logic. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20