Search Results - (( developing communication bayes algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing communication »
- communication bayes »
- implication based »
- java implication »
- bayes algorithm »
-
1
Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali
Published 2025“…The Naive Bayes algorithm was chosen for its efficiency in text classification and ability to handle large volumes of unstructured data. …”
Get full text
Get full text
Thesis -
2
-
3
Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment
Published 2014“…The subsystems, due to their diversified nature develop difficulties as the events communicate making the smart home uncomfortable. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Analysing machine learning models to detect disaster events using social media
Published 2023“…To simulate the examining process further, a fuzzy algorithm is developed to automatically rate the severity of a disaster as described in each message in disaster environment. …”
text::Thesis -
5
-
6
Breast cancer prediction using machine learning
Published 2021Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…Personal computer and DAQ cards are used to communicate and interface with the monitor to display the GUI which has been developed using Lab View. …”
Get full text
Get full text
Get full text
Article -
10
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The biological immune system (BIS) is characterized by networks of cells, tissues, and organs communicating and working in synchronization. It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The ADR schemes also presented high computational time due to communication channel breakdown, latency, and susceptibility to the cyberattack since the communication channel is used for the trip command transmission and considering the high cost of communication medium. …”
Get full text
Get full text
Thesis -
12
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The Bayesian net- work classi¯ers and the proposed algorithm have been tested using the second set. The studies conducted in this research have shown that Bayesian networks as one of the most successful machine learning classi¯ers for the damage detection in general and the Naijve bayes classi¯er in particular. …”
Get full text
Get full text
Thesis -
13
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis -
14
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Data collection experiments yield a diverse dataset of hand gestures, including variations in speed, essential for algorithm development. The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
Get full text
Get full text
Get full text
Thesis -
17
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
Get full text
Get full text
Get full text
Article -
18
