Search Results - (( based classification techniques algorithm ) OR ( data validation using algorithm ))

Refine Results
  1. 1

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Since the 1960s, many algorithms for data classification have been proposed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Computational Technique for an Efficient Classification of Protein Sequences With Distance-Based Sequence Encoding Algorithm by Iqbal, M.J., Faye, I., Said, A.M.D., Samir, B.B.

    Published 2017
    “…The performance of the proposed technique is validated using some of the best performing classifiers implemented previously for protein sequence classification. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…The performance of the proposed SCSO algorithm was compared with six state-of-the-art and recent wrapper-based optimization algorithms using the validation metrics of classification accuracy, optimum feature size, and computational cost in seconds. …”
    Get full text
    Get full text
    Article
  8. 8

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…Support Vector Machine (SVM) and k-nearest neighbour (knn) are used for the classification purposes. The proposed approach is validated using leave one out cross validation (LOOCV). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Intrusion detection system detects the violation of confidentiality, integrity, and availability of the data. Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Classification of fault and stray gassing in transformer by using duval pentagon and machine learning algorithms by Haw, Jia Yong, Mohd Yousof, Mohd Fairouz, Abd Rahman, Rahisham, Talib, Mohd Aizam, Azis, Norhafiz

    Published 2022
    “…Data resampling technique (SMOTETomek) is applied and shows further improvement on the accuracy of predictions by machine learning algorithms when deal with imbalance data. …”
    Get full text
    Get full text
    Article
  12. 12

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia by San, Limhwee

    Published 2006
    “…Average filtering was applied to the PM10 map to mininise the noise effect. The proposed algorithms were also validated using the multidate data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Ganoderma boninense classification based on near-infrared spectral data using machine learning techniques by Mas Ira Syafila, Mohd Hilmi Tan, Mohd Faizal, Jamlos, Ahmad Fairuz, Omar, Kamarulzaman, Kamarudin, Mohd Aminudin, Jamlos

    Published 2022
    “…However, a few overlapped NIRs’ spectral data between healthy and infected samples require for further validation which chemometric and machine learning (ML) classification technique are chosen. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhanced dimensionality reduction methods for classifying malaria vector dataset using decision tree by Arowolo, Micheal Olaolu, Adebiyi, Marion Olubunmi, Adebiyi, Ayodele Ariyo

    Published 2021
    “…The proposed algorithm is used to fetch relevant features based from the high-dimensional input feature space. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Recognition of Cylindrical and Conical Features Using Edge Boundary Classification by Ismail, N., Abu Bakar, N., Juri, A.H.

    Published 2005
    “…A case study is discussed and demonstrated to validate the proposed algorithms.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Breast cancer detection by using associative classifier with rule refinement method based on relevance feedback by Abubacker, Nirase Fathima, Azman, Azreen, Doraisamy, Shyamala, Azmi Murad, Masrah Azrifah

    Published 2022
    “…Once the initial classification is performed using the generalized rules for each test example, the results are validated using the experts feedback. …”
    Get full text
    Get full text
    Article
  19. 19

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis