Search Results - (( evolution classification model algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…In this work, we will develop a robust classification model that can be utilized in cancer diagnosis using immunofingerprint data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3
  4. 4
  5. 5

    Deep learning detector for pests and plant disease recognition by Ileladewa, Oluwatimilehin Adekunle

    Published 2020
    “…Meanwhile, evolution in deep convolutional neural networks for image classification has rapidly improved the accuracy of object detection, classification and system recognition. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…Finally, a new logic mining model namely Y-Type Random 2-Satisfiability Reverse Analysis was proposed, which showed optimal performances in terms of several metrics as compared to the existing classification models. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…However, the learning complexity of classification is increased due to the expansion number of learning model. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Digital economy tax compliance model in Malaysia using machine learning approach by Raja Azhan Syah Raja Wahab, Azuraliza Abu Bakar

    Published 2021
    “…The experimental results show that the ensemble method can improve the single classification model’s accuracy with the highest classification accuracy of 87.94% compared to the best single classification model. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…Feature selection was used to sort out key features for further classification. News classification into factors affecting stock market turning point was done using Naïve Bayes, Deep Learning, Generalized Linear Model (GLM) and Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Book Section
  10. 10

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16
  17. 17
  18. 18

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…The formula or equation model of urban SO2 concentration was also found through the GMDH algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis