Search Results - (( evolution optimization svm algorithm ) OR ( data implication from algorithm ))

Refine Results
  1. 1

    Improved whale optimization algorithm for feature selection in Arabic sentiment analysis by Tubishat, Mohammad, Abushariah, Mohammad A.M., Idris, Norisma, Aljarah, Ibrahim

    Published 2019
    “…In SA, feature selection phase is an important phase for machine learning classifiers specifically when the datasets used in training is huge. Whale Optimization Algorithm (WOA) is one of the recent metaheuristic optimization algorithm that mimics the whale hunting mechanism. …”
    Get full text
    Get full text
    Article
  2. 2

    Time series predictive analysis based on hybridization of meta-heuristic algorithms by Mustaffa, Zuriani, Sulaiman, Mohd Herwan, Rohidin, Dede, Ernawan, Ferda, Kasim, Shahreen

    Published 2018
    “…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
    Get full text
    Get full text
    Article
  3. 3

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Alan Fan et aI., [2] use Support Vector Machine (SVM) to stock market prediction. The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article
  4. 4

    Time series predictive analysis based on hybridization of meta-heuristic algorithms by Zuriani, Mustaffa, M. H., Sulaiman, Rohidin, Dede, Ernawan, Ferda, Shahreen, Kasim

    Published 2018
    “…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
    Get full text
    Get full text
    Book Section
  6. 6
  7. 7

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu by Md. Yunus, Aida Suraya

    Published 2001
    “…This study discusses the algorithms in multiplication involving decimal numbers from the perspectives of Form One students. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
    Get full text
    Get full text
    Article
  15. 15

    Prediction of payment method in convenience stores using machine learning by Pratondo, Agus, Novianty, Astri, Pudjoatmodjo, Bambang

    Published 2023
    “…The Random Forest algorithm was employed due to its robustness in handling complex, high-dimensional data, and its ability to provide reliable predictions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids by Chiaverini, Luca, Macdonald, David W., Hearn, Andrew J., Kaszta, Zaneta, Ash, Eric, Bothwell, Helen M., Can, Ozgun Emre, Channa, Phan, Clements, Gopalasamy Reuben *, Haidir, Iding Achmad, Kyaw, Pyae Phyoe, Moore, Jonathan H., Rasphone, Akchousanh, Tan, Cedric Kai Wei, Cushman, Samuel A.

    Published 2023
    “…Using felid presence-absence data from three study regions in Southeast Asia (mainland, Borneo and Sumatra), we tested the performances of SDMs by implementing four modelling frameworks: GLM and RF with bootstrapped and non-bootstrapped training data. …”
    Get full text
    Get full text
    Article
  17. 17

    Ethical implications of artificial intelligence in nursing care: a systematic literature review from an Islamic perspective by Wan Mamat, Wan Hasliza, Mahat, Nur Ain, Zainudin, Airul Azizan, Mohamad Shariff, Nurasikin, Syed Elias, Sharifah Munirah, Salah, Machouche, Jamaludin, Maizatul Aisha, Arini, Merita

    Published 2025
    “…The synthesis identified three primary ethical themes: 1) Safety, with subthemes of data privacy, misuse, algorithm bias, and physical safety; 2) Human element, focusing on trust, empathy, and human touch; and 3) Autonomy and informed decision-making. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Ahmad Salihin, Samsudin, Amir Izzani, Mohamed, Mohd Mawardi, Saari

    Published 2025
    “…Three distinct metaheuristic algorithms were investigated: Barnacles Mating Optimizer (BMO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA), each integrated with CatBoost to optimize critical parameters including learning rate, tree depth, regularization, and bagging temperature. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Temporal - spatial recognizer for multi-label data by Mousa, Aseel

    Published 2018
    “…Hence, there is a need for a recognition algorithm that can separate the overlapping data points in order to recognize the correct pattern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis