Search Results - (( developing communication bayes algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali by Mohd Razali, Farah Nabila

    Published 2025
    “…The Naive Bayes algorithm was chosen for its efficiency in text classification and ability to handle large volumes of unstructured data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment by Babakura, Abba, Sulaiman, Md Nasir, Mustapha, Norwati, Kasmiran, Khairul A.

    Published 2014
    “…The subsystems, due to their diversified nature develop difficulties as the events communicate making the smart home uncomfortable. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Analysing machine learning models to detect disaster events using social media by Faris Azni Azlan, Mr.

    Published 2023
    “…To simulate the examining process further, a fuzzy algorithm is developed to automatically rate the severity of a disaster as described in each message in disaster environment. …”
    text::Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Intelligent guidance parking system using modified Dijkstra's algorithm by Jaafar, Haslina, Zabidi, Muhamad Hidayat, Che Soh, Azura, Thong, Peng Hoong, Shafie, Suhaidi, Ahmad, Siti Anom

    Published 2014
    “…Personal computer and DAQ cards are used to communicate and interface with the monitor to display the GUI which has been developed using Lab View. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…The biological immune system (BIS) is characterized by networks of cells, tissues, and organs communicating and working in synchronization. It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The ADR schemes also presented high computational time due to communication channel breakdown, latency, and susceptibility to the cyberattack since the communication channel is used for the trip command transmission and considering the high cost of communication medium. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The Bayesian net- work classi¯ers and the proposed algorithm have been tested using the second set. The studies conducted in this research have shown that Bayesian networks as one of the most successful machine learning classi¯ers for the damage detection in general and the Naijve bayes classi¯er in particular. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…Data collection experiments yield a diverse dataset of hand gestures, including variations in speed, essential for algorithm development. The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18