Search Results - (( features extraction mining algorithm ) OR ( java implementation based algorithm ))

Refine Results
  1. 1

    Comparing the performance of FCBF, Chi-Square and relief-F filter feature selection algorithms in educational data mining by Zaffar, M., Hashmani, M.A., Savita, K.S.

    Published 2019
    “…The results of three filter feature selection algorithms are evaluated. The result of the paper extracted that Chi-Square and ReliefF perform better than FCBF on a dataset with larger number of features, however the performance of three selected algorithms is found worst on a student dataset with less number of instances. …”
    Get full text
    Get full text
    Article
  2. 2

    Comparing the performance of FCBF, Chi-Square and relief-F filter feature selection algorithms in educational data mining by Zaffar, M., Hashmani, M.A., Savita, K.S.

    Published 2019
    “…The results of three filter feature selection algorithms are evaluated. The result of the paper extracted that Chi-Square and ReliefF perform better than FCBF on a dataset with larger number of features, however the performance of three selected algorithms is found worst on a student dataset with less number of instances. …”
    Get full text
    Get full text
    Article
  3. 3

    Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms by Anuar N.K., Bakar A.A., Ahmad A.R., Yussof S., Rahim F.A., Ramli R., Ismail R.

    Published 2023
    “…Data Analytics; Data mining; Decision making; Feature extraction; Machine learning; Predictive analytics; Privacy by design; Features selection; Fine grains; No leakages; Predictive modeling; Privacy preserving; Learning algorithms…”
    Conference Paper
  4. 4

    An extended ID3 decision tree algorithm for spatial data by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2011
    “…It is because spatial data mining algorithms have to consider not only objects of interest itself but also neighbours of the objects in order to extract useful and interesting patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Discovering association rules for mining images datasets: a proposal by Hamzah, Azizi, O. K. Rahmat, Rahmita Wirza, Sulaiman, Md. Nasir

    Published 2005
    “…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry by Ma, Yuaner, Jabar, Juhaini, Abdul Aziz, Nor Azah

    Published 2023
    “…The integrated GSH-DM approach showcases the potential of combining feature selection techniques with advanced optimization algorithms in data mining applications. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…These phases are done with the use of Rapidminer and the Weka data mining tool. Three (3) types of features are used in this framework, which are the Generic Features, Payload Features and Hybrid Features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature by Qusay Bsoul, Jaffar Atwan, Rosalina Abdul Salam, Malik Jawarneh

    Published 2024
    Subjects: “…text mining , Arabic text clustering algorithms , terms extraction , un-supervised feature selection , optimal initial centroid…”
    journal::journal article
  11. 11

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  13. 13

    Classification Of Gender Using Global Level Features In Fingerprint For Malaysian Population by Abdullah, Siti Fairuz

    Published 2016
    “…A new approach of algorithm based on the Mark Acree’s theory, focusing on fingerprint global extracted features is proposed and implemented for enhancing gender classification method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Predicting game-induced emotions using EEG, data mining and machine learning by Min, Xuan Lim, Jason Teo

    Published 2024
    “…The data acquisition stage, data pre-processing, data annotation and feature extraction stage were designed and conducted in this paper to obtain and extract the EEG features from the Gameemo dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Improved building roof type classification using correlation-based feature selection and gain ratio algorithms by Norman, M., Mohd Shafri, Helmi Zulhaidi, Pradhan, Biswajeet, Yusuf, B.

    Published 2017
    “…First, the feature importance was evaluated using gain ratio algorithm, and the result was ranked, leading to selection of the optimal feature subset. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Article
  19. 19

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20