Search Results - (( data optimization system algorithm ) OR ( data classification system algorithm ))

Refine Results
  1. 1

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…This project focused on three main objectives: to investigate dengue data and Clonal Selection Algorithm for classification of Dengue, to design and develops Clonal Selection Classification System (CSCS) and to evaluate Clonal Selection Classification System symptoms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors by AlRijeb, Mothena Fakhri Shaker, Othman, Mohammad Lutfi, Ishak, Aris, Hassan, Mohd Khair, Albaker, Baraa Munqith

    Published 2025
    “…Selecting the relevant features from the data leads to better classification results. Optimization algorithms are successfully applied in the feature selection task in many systems. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Feature selection based on particle swarm optimization algorithm for sentiment analysis classification by Nurcahyawati, Vivine, Mustaffa, Zuriani

    Published 2021
    “…Furthermore, the proposed algorithm solves the complex background problems about noise data and feature selection that affect the classification performance on sentiment analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection by Chia, Yee Shin

    Published 2015
    “…The average classification accuracy of 99.47% on the test data achieved the acceptable average success rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M... by Mohamad Salehuddin, Mohamad Firdaus

    Published 2020
    “…These measurement inputs were then going through the process of classification in ANN to generate the optimized models by using LM algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…The optimized DBN algorithm, known as the HW-DBN algorithm, integrated through feature learning based on a Gaussian–Bernoulli Restricted Boltzmann Machine as well as classification task through a weight neuron network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification by Mohammed, Alhassan Afnan

    Published 2022
    “…However, finding the most appropriate deep learning algorithm for a medical classification problem along with its optimal parameters becomes a difficult task. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The proposed method of this study is to cater the problems occur in fuzzy systems by using optimization method. Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
    Conference Paper
  16. 16
  17. 17

    Lexicon-based and immune system based learning methods in Twitter sentiment analysis by Jantan, Hamidah, Drahman, Fatimatul Zahrah, Alhadi, Nazirah, Mamat, Fatimah

    Published 2016
    “…The aim of this article attempts to study the potential of this method in text classification for sentiment analysis.This study consists of three phases; data preparation; classification model development using three selected Immune System based algorithms i.e. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), and support vector machine (SVM) have been used for IDS in the last decades. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Real-time classification improvement of Indonesian sign system letters (SIBI) using K-Nearest Neighbor algorithm by Dhewa, Oktaf Agni, Utama, Safitri Yuliana, Nasuha, Aris, Gunawan, Teddy Surya, Pratama, Gilang Nugraha Putu

    Published 2024
    “…The information transfer process becomes biased when system predictions are incorrect. The current approach lacks accuracy due to data variations that may lead to character similarities. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20