Search Results - (( model validation study algorithm ) OR ( user identification tree algorithm ))*

Refine Results
  1. 1

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…There are a few outcomes that have been achieved to decide between those two machine learning methods that have better accuracy to carry out analysis on the dataset which of the two, but rather Decision Tree, have the greater accuracy. Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Mohd Sobran, Nur Maisarah, Bahar, Mohd Bazli, Oh, Kok Ken, Mat Ibrahim, Masrullizam, Johan, Nurul Fatiha

    Published 2016
    “…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Rapid lard identification with portable electronic nose by Latief, Marsad, Khorsidtalab, Aida, Saputra, Irwan, Akmeliawati, Rini, Nordin, Anis Nurashikin, Jaswir, Irwandi, Witjaksono, Gunawan

    Published 2017
    “…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Rapid lard identification with portable electronic nose by Latief, M., Khorsidtalab, A., Saputra, I., Akmeliawati, R., Nurashikin, A., Jaswir, I., Witjaksono, G.

    Published 2017
    “…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
    Get full text
    Get full text
    Article
  8. 8

    Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm by Ariff Nijay, Ramli

    Published 2023
    “…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…However, the conversion of a complex form of ML algorithms into a simple statistical model is the prime concern. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
    Get full text
    Get full text
    Article
  11. 11

    A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model by Ouwabunmi, Babalola AbdulHafeez

    Published 2025
    “…While the focus was on comparing standalone and hybrid models, the study identifies opportunities for future benchmarking against external tools to further validate its contributions. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control by Tuan Abdul Rahman, Tuan Ahmad Zahidi, As'arry, Azizan, Abdul Jalil, Nawal Aswan, Raja Ahmad, Raja Mohd Kamil

    Published 2019
    “…The performance of modified SFS algorithm to train a nonlinear auto-regressive exogenous model (NARX) structure FNNs-based model of the system was then compared with its predecessor and with several well-known metaheuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Model structure selection for a discrete-time non-linear system using genetic algorithm by Ahmad, Robiah, Jamaluddin , Hishamuddin, Hussain, Mohd. Azlan

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Article
  17. 17

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Article
  18. 18

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    Optimization of multi-holes drilling toolpath using tiki-taka algorithm by Norazlina, Abdul Rahman

    Published 2024
    “…The study aims to model the MDMT toolpath using the Traveling Salesman Problem (TSP) concept, apply TTA to optimize this model, and validate the model and algorithm through machining experiments on this problem. …”
    Get full text
    Get full text
    Thesis