Search Results - (( bayesian classification rules algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- bayesian classification »
- normalization algorithm »
- classification rules »
- data normalization »
- rules algorithm »
- java »
-
1
Accuracy and performance analysis for classification algorithms based on biomedical datasets
Published 2021“…The study suggests finding a classifier among the most common kinds of classification algorithms within a combined approach represent in Bayesian, Trees, Rules, Function, and lazy algorithms to automate a better performance of early detection of diseases from the medical datasets. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Application Of Neural Network In Malaria Parasites Classification
Published 2006“…Multilayer Perceptron (MLP) network and Radial Basis Function (RBF) network will be developed using MATLAB in which MLP network is trained with Back Propagation, Bayesian Rule and Levenberg-Marquardt learning algorithm and RBF network is trained with k-means clustering algorithm. …”
Get full text
Get full text
Monograph -
3
Affective computation on EEG correlates of emotion from musical and vocal stimuli
Published 2009“…An intersubject validation study is performed on healthy subjects to assess the performance of ABCI using a selection of classification algorithms. The results show that ABCI that employed the Bayesian network and the One-Rule classifier yielded a promising inter-subject validation accuracy of 90%.…”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
8
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
