Search Results - (( data classification methods algorithm ) OR ( using action method algorithm ))

Refine Results
  1. 1

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…The experimental results show that Naive-Bayes classifier with web text extraction algorithm proves to be the best method for web text classification.…”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
    Get full text
    Get full text
    Thesis
  4. 4

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…The comparative analysis is also conducted to discover the best classification model for prediction. From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…Data pre-processing method carries out certain computations such as data transformation (normalization, aggregation) to improve data quality. …”
    Get full text
    Get full text
    Student Project
  7. 7

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…In this study, exhaustive empirical research of the machine learning algorithm for hand posture classification has been established. …”
    Get full text
    Get full text
    Article
  8. 8

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles by Muhammad Qasim, Khan, Musse Mohamud, Ahmed, Ahmed Mohamed, Ahmed Haidar

    Published 2022
    “…Among different algorithms, this study focuses on modelling the non- recursive phasor estimation method in a power Simulink environment for a standard test system equipped with a developed algorithm to detect the fault zone. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Multi-layer perceptron (MLP) neural network trained using backpropagation algorithm is used to segment the color image. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…Artificial intelligence systems are widely used to extract and analyze the complicated human actions through logical and mathematical rules. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Classification and prediction of obesity levels among subjects in Colombia, Peru, and Mexico using unsupervised and supervised learning by Suhaila, Bahrom, Anuar, Ab Rani, Aisyah Amalina, Mohd Noor

    Published 2024
    “…The study enhances understanding of obesity classification through machine learning and integrates data inspection, formatting, and exploration using Excel, Python, and graphical user interfaces (GUIs) such as SweetViz and PandaGui. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol by Napiah, Mohamad Nazrin, Idris, Mohd Yamani Idna, Ramli, Roziana, Ahmedy, Ismail

    Published 2018
    “…These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. …”
    Get full text
    Get full text
    Article
  15. 15

    Digital economy tax compliance model in Malaysia using machine learning approach by Raja Azhan Syah Raja Wahab, Azuraliza Abu Bakar

    Published 2021
    “…Based on the validation of training data with the presence of seven single classifier algorithms, three performance improvements have been established through ensemble classification, namely wrapper, boosting, and voting methods, and two techniques involving grid search and evolution parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…Cross validation is used to find the best parameters related to kernels used followed by training and testing of the data sets. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article