Search Results - (( code classifications using algorithm ) OR ( label classification system algorithm ))
Search alternatives:
- classifications using »
- classification system »
- code classifications »
- label classification »
- system algorithm »
- using algorithm »
-
1
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…In view of the needed improvement in OER, there is need to test a novel data mining, and knowledge discovery approach within collected spectrometer data from the oil palm FFB, using WEKA software for classification, and prediction of the oil palm FFB ripeness, to enhance the current manual human grader system. …”
Get full text
Get full text
Get full text
Thesis -
2
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…In pattern recognition system, achieving high accuracy in pattern classification is crucial. …”
Get full text
Get full text
Thesis -
3
-
4
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018“…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…It is set to label since it has no label class. The classification is set to two categories: Eligible or Ineligible. …”
Get full text
Get full text
Thesis -
8
Classification of JPEG files by using extreme learning machine
Published 2018“…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
Get full text
Get full text
Article -
9
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
Published 2025“…Seven machine learning models—Artificial Neural Network (ANN), Random Forest (RF), Decision Tree (DTT), k-Nearest Neighbors (k-NN), Naïve Bayes (NB), Support Vector Machine (SVM), and Deep Neural Network (DNN)—were used for multi-label classification of the complications. The study employed two MLC frameworks: Problem Transformation methods (Binary Relevance, Classifier Chains, Label Power Set, and Calibrated Label Ranking) and Algorithm Adaptation. …”
Get full text
Get full text
Get full text
Thesis -
10
VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING
Published 2022“…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
Published 2018“…The files are allocated in a continuous series of clusters. The ELM algorithm is applied to the DFRWS (2006) dataset and the results show that the combination of the three methods produces 93.46% classification accuracy.…”
Get full text
Article -
12
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
13
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
Get full text
Get full text
Get full text
Article -
14
-
15
Diagnostic And Classification System For Kids With Learning Disabilities
Published 2017“…In this research, we propose an automated diagnostic and classification system. The system is trained by pre-classified data of 857 school children scores in spelling and reading. …”
Get full text
Get full text
Proceeding -
16
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The machine learning algorithms have been performed with labeled output for prediction classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Content-based feature selection for music genre classification
Published 2022Get full text
Get full text
Get full text
Article -
20
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. However, numerous data mining techniques have been successfully applied in this area to find intrusions hidden in large amounts of audit data through classification, clustering or association rule. …”
Get full text
Get full text
Get full text
Article
