Search Results - (( code classification using algorithm ) OR ( label classification system algorithm ))

Refine Results
  1. 1

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…In view of the needed improvement in OER, there is need to test a novel data mining, and knowledge discovery approach within collected spectrometer data from the oil palm FFB, using WEKA software for classification, and prediction of the oil palm FFB ripeness, to enhance the current manual human grader system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…In pattern recognition system, achieving high accuracy in pattern classification is crucial. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…It is set to label since it has no label class. The classification is set to two categories: Eligible or Ineligible. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Classification of JPEG files by using extreme learning machine by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
    Get full text
    Get full text
    Article
  9. 9

    Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout by Dzakiyullah, Nur Rachman

    Published 2025
    “…Seven machine learning models—Artificial Neural Network (ANN), Random Forest (RF), Decision Tree (DTT), k-Nearest Neighbors (k-NN), Naïve Bayes (NB), Support Vector Machine (SVM), and Deep Neural Network (DNN)—were used for multi-label classification of the complications. The study employed two MLC frameworks: Problem Transformation methods (Binary Relevance, Classifier Chains, Label Power Set, and Calibrated Label Ranking) and Algorithm Adaptation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING by ONG KANG WEI, ONG KANG WEI, LOH SER LEE, LOH SER LEE

    Published 2022
    “…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…The files are allocated in a continuous series of clusters. The ELM algorithm is applied to the DFRWS (2006) dataset and the results show that the combination of the three methods produces 93.46% classification accuracy.…”
    Get full text
    Article
  12. 12

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Diagnostic And Classification System For Kids With Learning Disabilities by Rehman, Ullah Khan, Julia Ai Cheng, Lee, Yin, Bee Oon

    Published 2017
    “…In this research, we propose an automated diagnostic and classification system. The system is trained by pre-classified data of 857 school children scores in spelling and reading. …”
    Get full text
    Get full text
    Proceeding
  16. 16

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. However, numerous data mining techniques have been successfully applied in this area to find intrusions hidden in large amounts of audit data through classification, clustering or association rule. …”
    Get full text
    Get full text
    Get full text
    Article