Search Results - (( developing network bayes algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Sentiment analysis regarding childcare issues using Naive Bayes Algorithm / Alis Farhana Zulkipeli by Zulkipeli, Alis Farhana

    Published 2025
    “…This study applies the Naive Bayes algorithm for sentiment analysis to assess public perceptions of childcare issues, particularly child abandonment and accidents. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis
  7. 7

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Hui, Bian, Chiew, Kang Leng

    Published 2025
    “…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli by Rosli, Mohamad Shafiq

    Published 2021
    “…With the rise of mobile technology and internet access, recent development in machine learning have designed many algorithms to solve diverse human problems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The development of computer networks today is increased rapidly. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…A variety of record linkage algorithms with different steps have been developed in order to detect such duplicate records. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…This study includes the scripting and development of supervised ML techniques such as Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes, Random Forest, and Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Engine fault diagnosis using probabilistic neural network by Sheng, Zhu, Min, Keng Tan, Ka, Renee Yin Chin, Bih, Lii Chua, Xiaoxi, Hao, Tze, Kenneth Kin Teo

    Published 2021
    “…Therefore, this study would like to explore the feasibility of implementing auto fault diagnosis using Probabilistic Neural Network (PNN). A benchmarked engine fault model is developed and simulated in Maltab. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  17. 17

    Using convolution neural networks for improving customer requirements classification performance of autonomous vehicle by Hao, Wang, Asrul, Adam, Fengrong, Han

    “…These categories will be as input for the next process development in making the best decision. Most of conventional algorithms, such as, Naive Bayes, MAXENT, and support vector machine (SVM), only use limited human engineered features and their accuracy for customized corpus in sentences classification are proven low which is less than 50 percent. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms by Lei, X., Mohamad, U.H., Sarlan, A., Shutaywi, M., Daradkeh, Y.I., Mohammed, H.O.

    Published 2022
    “…For the objective of classifying FI in terms of fraud or not, the Intelligent Information System for Financial Institutions (IISFI) relying on Supervised ML (SML) Algorithms has been created in this work. Bayesian Belief Network, Neural Network, Decision trees, Naïve Bayes, and Nearest Neighbor has been compared for the purpose of classifying FI risks using the performance measures asfalse positive rate, true positive rate, true negative rate, false negative rate, accuracy, F-Measure, Mean Absolute Error (MAE), Mean Squared Error (MSE), Root Mean Square Error (RMSE), Med AE, Receiver Operating Characteristic (ROC) area,Precision Recall Characteristic (PRC) area, and measures of PC. …”
    Get full text
    Get full text
    Article
  20. 20

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item