Search Results - (( developing program bayes algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…Multilayer Perceptron algorithm has been the best algorithm with the highest success percentage in both of the programs; Decision Trees has been the algorithm which has the lowest success percentage again in both of the programs. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir by Amir, Nur Hazirah

    Published 2019
    “…It implemented Supervised Learning algorithm with Bayes’ Theorem model for the calculation of mood prediction using Python programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms by Lei, X., Mohamad, U.H., Sarlan, A., Shutaywi, M., Daradkeh, Y.I., Mohammed, H.O.

    Published 2022
    “…ML can examine millions of data sets in a short period of time without being explicitly programmed to improve the results. This type of algorithm can aid financial institutions in making grant selections for their clients. …”
    Get full text
    Get full text
    Article
  8. 8

    Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli by Rosli, Mohamad Shafiq

    Published 2021
    “…The programming is a subject that are used by developer to provide the system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2024
    “…The increase of mobile device enhancement grows. With this development, mobile phones are supporting many programs, and everyone takes advantage of them. …”
    Get full text
    Get full text
    Article
  11. 11

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2023
    “…The increase of mobile device enhancement grows. With this development, mobile phones are supporting many programs, and everyone takes advantage of them. …”
    Get full text
    Get full text
    Article
  12. 12

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining by Termedi @ Termiji, Mohammad Izzuan

    Published 2023
    “…Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…More significantly, this paper empirically discusses and compares the performances of six supervised machine learning algorithms, known as K-Nearest Neighbors (K-NN), Decision Tree (DT), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB), and Logistic Regression (LR), which are commonly used in the literature for detecting malware apps.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article