Search Results - (( developing knowledge identification algorithm ) OR ( java feature classification algorithm ))
Search alternatives:
- knowledge identification »
- identification algorithm »
- feature classification »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
4
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
Get full text
Get full text
Thesis -
5
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
Get full text
Get full text
Monograph -
6
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-general knowledge which consists of rule-based expert system is developed from simulation result obtained from HYSIS process simulator. …”
Get full text
Get full text
Article -
7
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024Conference Paper -
8
Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg
Published 2006“…Thus, in order to provide better access to relevant knowledge, the knowledge of metabolic pathway should be conceptualized and formalized using appropriate knowledge representation technique. …”
Get full text
Get full text
Thesis -
9
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…This study underscores the CNN algorithm's viability for accurate rabbit breed identification. …”
Get full text
Get full text
Thesis -
10
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Plants identification has become a significant and incentive research area. …”
Get full text
Get full text
Thesis -
11
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
Get full text
Get full text
Get full text
Article -
12
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
13
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
14
Grid-based simultaneous localization and mapping using Rao-blackwellized particle filter with neural network for mini robots / Norhidayah Mohamad Yatim
Published 2018“…OG map representation does not need for landmark identification but described occupancy of an area. In this research, to enable mini robots to operate in various environment, OG map with SLAM or grid-based SLAM algorithm was developed. …”
Get full text
Get full text
Thesis -
15
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
16
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…This research introduces a developed method for online system identification based on the Hammerstein and Wiener nonlinear block-oriented structure with the artificial neural networks (NN) advantages and recursive weighted least squares algorithm for optimizing neural network learning in real-time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The development of science and the spread of knowledge coincide with growing number of publications, and the volume of online content continue to grow at a rapid rate. …”
Article -
18
-
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The third stage is to classify individual jammers according to the specific pattern and characteristics design as defined in jamming identification and classification parameters. It involves development of Max-Min Rule-Based Classification Algorithm. …”
Get full text
Get full text
Thesis -
20
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis
