Search Results - (( framework implementation using algorithm ) OR ( based classification technique algorithm ))

Refine Results
  1. 1

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…Thus, an accurate automated technique for timely detection and classification is needed to cope with the aforementioned challenges.There exist techniques grounded on machine learning and deep learning procedures that use the existing dataset i.e., â��The Plant Village Datasetâ�� and perform classification into only two classes in potato leaves. …”
    Get full text
    Get full text
    Article
  5. 5

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…Thus, an accurate automated technique for timely detection and classification is needed to cope with the aforementioned challenges.There exist techniques grounded on machine learning and deep learning procedures that use the existing dataset i.e., â��The Plant Village Datasetâ�� and perform classification into only two classes in potato leaves. …”
    Get full text
    Get full text
    Article
  6. 6

    Detection of corneal arcus using rubber sheet and machine learning methods by Ramlee, Ridza Azri

    Published 2019
    “…To ensure the obtained classification results are robust and stable the cross validation (CV) technique is used. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy by Al-Dabbagh, Rawaa Dawoud, Neri, Ferrante, Idris, Norisma, Baba, Mohd Sapiyan

    Published 2018
    “…The proposed design framework provides readers with the main steps required to integrate any proposed meta-algorithm into parameter and/or strategy adaptation schemes.…”
    Get full text
    Get full text
    Article
  8. 8

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Improve k-NN Classifier using Similarity Distance Plot-Data Reduction and Dask for Big Datasets by Abdul Muqtasid, Rushdi

    Published 2025
    “…The k-Nearest Neighbour (k-NN) algorithm is one of the most widely used Instance-Based Learning methods due to its simplicity and ease of implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
    Get full text
    Get full text
    Article
  12. 12

    Context enrichment framework for sentiment analysis in handling word ambiguity resolution by Yusof, Nor Nadiah

    Published 2024
    “…The similarity between ambiguous words and their context words is evaluated using the cosine similarity approach. A rule-based method is introduced to select context words based on their similarity. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach by Mustakim, Nurul Ain

    Published 2025
    “…The framework uses machine learning methods, including classification, clustering, feature selection, and parameter tuning, to improve accuracy and reliability. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Experiments conducted to proof the validity and feasibility of the proposed framework using dataset from IAM Database by comparing the proposed framework to the existing Writer Identification framework and various feature selection techniques and frameworks yield satisfactory results. …”
    Get full text
    Get full text
    Book Chapter
  15. 15

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Experiments conducted to proof the validity and feasibility of the proposed framework using dataset from IAM Database by comparing the proposed framework to the existing Writer Identification framework and various feature selection techniques and frameworks yield satisfactory results. …”
    Get full text
    Get full text
    Book Chapter
  16. 16

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  17. 17

    A new fuzzy criterion-referenced assessment with a fuzzy rule selection technique and a monotonicity-preserving similarity reasoning scheme by Jee, T.L, Tay, K.M, Ng, CK

    Published 2013
    “…Selected rules are identified in such that the unselected rules can be deduced via a monotonicity-preserving SR technique. We formulate the process of minimizing the number of selected rules as a constrained optimization problem and a genetic algorithm (GA) technique is implemented. …”
    Get full text
    Get full text
    Article
  18. 18

    An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
    Get full text
    Get full text
    Thesis