Search Results - (( java implementation bayes algorithm ) OR ( using string learning algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…In this system, the layout was designed under two categories which are the standard bay size and the small bay size to increase the parking bays. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A new text-based w-distance metric to find the perfect match between words by Ali, M., Jung, L.T., Hosam, O., Wagan, A.A., Shah, R.A., Khayyat, M.

    Published 2020
    “…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
    Get full text
    Get full text
    Article
  4. 4

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network by Francis, Adam

    Published 2005
    “…The second objective is to locate the position of the amount courtesy block for the extraction process by using the Coordinate Search. The third objective is to perform Vertical Splitting Algorithm technique for digit segmentation. …”
    Get full text
    Student Project
  8. 8

    Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi

    Published 2023
    “…In order to select the most significant wavelengths, genetic algorithm (GA) was used as a forward feature selection technique. …”
    Get full text
    Get full text
    Article
  9. 9

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In feature extraction, the Lexicon-based Model, Machine learning Model and deep learning Model usually was used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  10. 10

    Personal identification by Keystroke Pattern for login security by Abdullah, Norhayati

    Published 2001
    “…The data obtained were presented to NN for pattern learning and classifying the strings of characters. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
    Get full text
    Thesis
  13. 13

    Ensemble based categorization and adaptive model for malware detection by Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2011
    “…Current malware detection method involved string search algorithm which based on the pattern detection. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Discovering optimal features using static analysis and a genetic search based method for Android malware detection by Firdaus, Ahmad, Anuar, Nor Badrul, Karim, Ahmad, Razak, Mohd Faizal Ab

    Published 2018
    “…However, static analysis requires a minimum number of features to efficiently classify malware. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
    Get full text
    Get full text
    Article
  17. 17

    Discovering optimal features using static analysis and a genetic search based method for Android malware detection by Ahmad Firdaus, Zainal Abidin, Nor Badrul, Anuar, Ahmad, Karim, Mohd Faizal, Ab Razak

    Published 2018
    “…However, static analysis requires a minimal number of features to classify malware efficiently. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    How can unmanned aerial vehicles be used for detecting weeds in agricultural fields? by Mohidem, Nur Adibah, Che’Ya, Nik Norasma, Juraimi, Abdul Shukor, Fazlil Ilahi, Wan Fazilah, Mohd Roslim, Muhammad Huzaifah, Sulaiman, Nursyazyla, Saberioon, Mohammadmehdi, Mohd Noor, Nisfariza Maris

    Published 2021
    “…Most of the weed images were captured using red, green, and blue (RGB) camera, i.e., 48.28% and main classification algorithm was machine learning techniques, i.e., 47.90%. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…When compared with industry standard methods, the neural networks show very poor performance when 2-D bit-strings descriptors are used. However, their relative performance improves when used with topological indices as descriptors. …”
    Get full text
    Get full text
    Monograph