Search Results - (( ((java implication) OR (_ implication)) force algorithm ) OR ( using code mining algorithm ))
Search alternatives:
- java implication »
- mining algorithm »
- force algorithm »
- _ implication »
- code mining »
- using code »
-
1
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…This research project is aiming to create computing environment that enable us use to text mining the Quran. The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. …”
Get full text
Get full text
Article -
6
-
7
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan
Published 2022“…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
Get full text
Get full text
Book Section -
9
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
10
Classification of metamorphic virus using n-grams signatures
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A new inexact line search method for convex optimization problems
Published 2013“…In general one can say that line search procedure for the steplength and search direction are two important elements of a line search algorithm. The line search procedure requires much attention because of its far implications on the robustness and efficiency of the algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
12
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…This study only focuses on three types of clustering techniques which are k-means clustering, agglomerative hierarchical clustering with the ward’s linkage, complete linkage, and average linkage, and Self-Organizing Map (SOM). The clustering algorithms are written using Python language by modifying the coding obtained from the Internet. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
An enhanced android botnet detection approach using feature refinement
Published 2019“…As a result, Android botnet can be used to initiate various distributed coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service attacks disseminating other malware and much more. …”
Get full text
Get full text
Thesis -
14
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…In phase 3, Latent Semantic Analysis (LSA) and tfidf term weighting are used in order to determine document relatedness. …”
Get full text
Get full text
Thesis -
15
Aligning Malaysian SMEs with the megatrends: the roles of HPWPs and employee creativity in enhancing Malaysian SME performance
Published 2018“…The partial least squares algorithm and the bootstrapping technique were used for data analysis. …”
Get full text
Get full text
Article -
16
Analyzing surface settlement factors in single and twin tunnels : A review study
Published 2024“…Leveraging historical data and ML algorithms can enhance SS prediction accuracy and aid in proactive risk management. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
The relationships between brand attributes and word of mouth on brand identity and brand image
Published 2017“…Finally, the study's implications for theory and practice, limitations, conclusions as well as directions for future research are provided and discussed.…”
Get full text
Get full text
Get full text
Thesis
