Search Results - (( data classification techniques algorithm ) OR ( process identification using algorithm ))

Refine Results
  1. 1

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Data mining in mobile ECG based biometric identification by Sidek, Khairul Azami, Mai, Vu, Khalil, Ibrahim

    Published 2014
    “…Experimentation results showed that our method simplifies biometric identification process by obtaining reduced computational complexity when compared to other related algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter by Woon, W.C., Yahya, N., Badruddin, N.

    Published 2019
    “…In this work, we investigated the classification of EEG eye state data using statistical and CSP filter technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter by Woon, W.C., Yahya, N., Badruddin, N.

    Published 2019
    “…In this work, we investigated the classification of EEG eye state data using statistical and CSP filter technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Plant recognition based on identification of leaf image using image processing / Nor Silawati Sha’ari by Sha’ari, Nor Silawati

    Published 2018
    “…The main objective is to developing a classification system for agriculture plant by image pre-processing, feature extraction, network training and classification. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Identification model for hearing loss symptoms using machine learning techniques by Nasiru Garba Noma

    Published 2014
    “…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Fuzzification of epileptic data: an application for prediction and identification of partial seizure by Malik, Aamir Saeed, Nasif, Mohammad Shakir, Kamel , Nidal, Qidwai, U.

    Published 2013
    “…This paper presents a classification technique by using Fuzzy Logic System to identify and predict the partial seizure from epileptic data. …”
    Get full text
    Citation Index Journal
  11. 11

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Balancing data utility versus information loss in data-privacy protection using k-Anonymity by Esmeel, Thamer Khalil, Hasan, Md Munirul, Kabir, Muhammad Nomani, Ahmad, Firdaus

    “…The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh by Sai , Chong Yeh

    Published 2020
    “…This study proposed an integrated system for EEG signals pre-processing by using machine learning algorithms in the identification of artifactual components during the process of Wavelet-ICA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Development of vehicle counting system by using background subtraction technique / Muhammad Fadhli Md Azemin by Md Azemin, Muhammad Fadhli

    Published 2018
    “…Training image labeler is used to training the data images. The process is developed and implemented using MATLAB. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…The proposed IMVO-DLIDS model follows a three-stage process. At first, data pre-processing is performed to convert the actual data into useful format. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…The original FVRS developed only provides verification instead of identification. For identification, the image processing involves process of image pre-processing, feature extraction and classification. …”
    Get full text
    Get full text
    Monograph
  19. 19

    The Identification of hunger behaviour of lates calcarifer using k-nearest neighbour by Zahari, Taha, Mohd Azraai, M. Razman, N. F., Adnan

    Published 2018
    “…In the present study, a correlation of Barramundi fish-school behaviour with hunger condition through the hybrid data integration of image processing technique is established. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…The Self-Training algorithm greatly benefits semi-supervised learning which allows classification of entities given only a small-size of labelled data. …”
    Get full text
    Get full text
    Thesis