Search Results - (( data classification system algorithm ) OR ( using solution using algorithm ))

Refine Results
  1. 1

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…Some of the dengue data are used to test the dengue classification system to produce the classification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  3. 3
  4. 4
  5. 5

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…The imbalanced problem of both proposed general classification algorithms which is the limitation of accuracy performance specifically in classifying on the minority class has motivated this research to improve their classification performance on imbalanced data sets. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan by Redzuan, Nur Amalina

    Published 2013
    “…In future, a comparative study on Artificial Immune System and other techniques or algorithms can be carried out to enhance the performance of the classification model.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…The experiment evaluated 8000 real data samples and the result showed that InfoGainEval and KNN algorithm are the most selected in attribute selection and classification process.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain by Mohamad Zain, Muhammad Asyraf

    Published 2020
    “…For the future work, this system need to be improved by using dataset that are related to the ASD and by using other classification algorithm.…”
    Get full text
    Get full text
    Thesis
  12. 12

    An intra-severity classification and adaptation technique to improve dysarthric speech recognition accuracy / Bassam Ali Qasem Al-Qatab by Bassam Ali Qasem, Al-Qatab

    Published 2020
    “…Secondly, the identified severity level of a particular dysarthric speaker in the first stage is applied to the corresponding intra-severity adaptation of dysarthric speech. For the classification part, there are six algorithms used to classify the intra-severity of dysarthric speakers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    An improved genetic-fuzzy system for classification and data analysis by Lahsasna, A., Seng, W.C.

    Published 2017
    “…Interpretability of classification systems, which refers to the ability of these systems to express their behavior in an understandable way, has recently gained more attention and it is considered as an important requirement especially for knowledge-based systems. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…This research presents a two-phase phishing detection system by employing unsupervised feature selection and supervised classification. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Deep learning-based item classification for retail automation by Ling, Ji Xiang

    Published 2025
    “…The project involved creating a comprehensive dataset of retail items, which was preprocessed using data augmentation techniques to enhance model generalization. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Prognostic Health Management of Pumps Using Artificial Intelligence in the Oil and Gas Sector: A Review by Aliyu, R., Mokhtar, A.A., Hussin, H.

    Published 2022
    “…While the need for selecting appropriate training algorithms is seen to be significant. Interestingly, no specific method or algorithm exists for a given problem instead the solution relies on the type of data and the algorithmâ��s or methodâ��s aptitude for resolving the provided errors. …”
    Get full text
    Get full text
    Article