Search Results - (( java application customization algorithm ) OR ( construct validity classification algorithm ))

Refine Results
  1. 1

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…Support Vector Machine (SVM) and k-nearest neighbour (knn) are used for the classification purposes. The proposed approach is validated using leave one out cross validation (LOOCV). …”
    Get full text
    Get full text
    Thesis
  2. 2

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…Therefore, our proposed GA-FIS method will first define the membership functions with logical interpretation which is amendable by domain experts to human understanding, and then genetic algorithm serves as an optimization tool to construct the best combination of rules in fuzzy inference system that can achieve higher classification accuracy and gain better interpretability. …”
    Article
  3. 3

    An Arabic hadith text classification model using convolutional neural network and support vector machine / Mohd Irwan Mazlin by Mazlin, Mohd Irwan

    Published 2022
    “…In order to construct the dataset, the dataset is validated by an expert from lecturer University Sains Islam Malaysia. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers by Kumar, Sunil, Ratnoo, Saroj, Vashishtha, Jyoti

    Published 2021
    “…Further, the suggested hyper heuristic algorithm constructs significantly comprehensible models as compared to WEKA's J48, CART and other similar decision tree construction strategies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A framework for classification software security using common vulnerabilities and exposures by Hassan, Nor Hafeizah

    Published 2018
    “…This inclusive of the investigation of vulnerability classification objectives,processes,classifiers and focus domains among prominent framework.Final step is to construct the framework by establishing the formal presentation of the vulnerability classification algo-rithm.The validation process was conducted empirically using statistical method to assess the accuracy and consistency by using the precision and recall rate of the algorithm on five data sets each with 500 samples.The findings show a significant result with precision's error rate or p value is between 0.01 and 0.02 with error rate for recall's error rate is between 0.02 and 0.04.Another validation was conducted to verify the correctness of the classification by using expert opinions,and the results showed that the ambiguity of several cases were subdue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Deep learning for EEG data analysis by Cheah, Kit Hwa

    Published 2018
    “…The convolutional neural network (CNN) model constructed in this project has achieved a validation accuracy of 75±1% using the same EEG dataset. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224) by Mahat, Nor Idayu, Engku Abu Bakar, Engku Muhammad Nazri, Zakaria, Ammar, Mohd Nazir, Mohd Amril Nurman, Misiran, Masnita

    “…Next, the weighted and transformed features were used to train Linear Discriminant Function (LDA) and to evaluate the constructed rule. The designed algorithm was structured in k-fold cross-validation in attempt to minimise the biasness of the classification performance, measured using error rate. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain by Ong, Pauline, Tieh, Tony Hieng Cai, Lai, Kee Huong, Lee, Woon Kiow, Ismon, Maznan

    Published 2019
    “…Comparative experiments demonstrated that SVM with the MFO-selected features outperformed the others, with the classification accuracy of 99.60%, thus validating its effectiveness.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Sound quality classification of wood used for Sarawak traditional musical instrument- Sape / Wong Tee Hao by Wong , Tee Hao

    Published 2024
    “…To address dataset imbalances, Synthetic Minority Oversampling Technique was used, enhancing dataset quality before training 40 machine learning classification algorithms. Among these, the Gaussian-kernel Support Vector Machine stood out, achieving remarkable performance with 88.18% validation and 93.37% test accuracies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…The biometric recognition process was done by extraction of vascular line features by Local Binary Pattern (LBP), and classification by K-nearest neighbour (KNN) algorithm using cross-validation technique. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…However, when risk degrees were closely matched, the integrated model with weight adjustments based on base models outperformed ANN. To validate the research findings, a second experiment was conducted in a construction scenario, still utilizing two clips with closely matched risk degrees. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A comparative study on aviation arrival delay prediction using machine learning methods by Chew, Pui Ting

    Published 2023
    “…Furthermore, 5-fold cross validation on ANN shows overall accuracy and misclassification rate of 0.952601 and 0.047399 respectively, with insignificant differences among the folds. …”
    Get full text
    Thesis