Search Results - (( binary classification mining algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An improved algorithm for iris classification by using support vector machine and binary random machine learning by Kamarulzalis, Ahmad Haadzal

    Published 2018
    “…The first objective of this study is to improve a new algorithm technique for classification. The new algorithm come from a combination of an ideas of k-NN algorithm and ensemble concept. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO by Sharifah Sakinah, Syed Ahmad

    Published 2014
    “…The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm’s performance is illustrated by the corresponding table of the classification rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Logic mining method via hybrid discrete hopfield neural network by Guo, Yueling, Mohd Kasihmuddin, Mohd Shareduwan, Zamri, Nur Ezlin, Li, Jia, Romli, Nurul Atiqah, Mansor, Mohd Asyraf, Ruzai, Wan Nur Aqlili

    Published 2025
    “…Despite the success, the limitations of existing logic mining methods are often overlooked, hindering the search for optimal solutions in binary classification tasks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Enhancement of new smooth support vector machines for classification problems by Santi Wulan, Purnami

    Published 2011
    “…Research on Smooth Support Vector Machine (SSVM) for classification problem is an active field in data mining. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Overview of biomedical relations extraction using hybrid rule-based approaches. by Abdul Kadir, Rabiah, Bokharaeian, Behrouz

    Published 2013
    “…These huge amounts of information cause very difficult task of extraction or classification.Therefore, there is a need for knowledge discovery and text mining tools in this field. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Multitasking deep neural network models for Arabic dialect sentiment analysis by Alali, Muath Mohammad Oqlah

    Published 2022
    “…Therefore, a model called Multi-Tasking Learning based on Convolutional Hierarchical Attention Neural Network (MTL-CHAN) is proposed, comprising of (i) shared word encoder and word attention networks across classification tasks, (ii) task-specific layers with convolutional neural network-based attention (CNNA) on sentence-level; to handle the Arabic explicit negation words and improve the classification performance by training Arabic classification tasks (binary, ternary, and five) jointly. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing by Ramadhan, Rakhmat Sani

    Published 2014
    “…This research concerns on binary classification which is classified into two classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item