Search Results - (( java implementation learning algorithm ) OR ( problem implementation bayes algorithm ))
Search alternatives:
- implementation learning »
- problem implementation »
- implementation bayes »
- java implementation »
- learning algorithm »
- bayes algorithm »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This work employed the use of machine learning approach. Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
Get full text
Get full text
Get full text
Thesis -
2
Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun
Published 2025“…In the design and implementation phases, TF-IDF was considered in cleaning and preparing the reviews for application, while the construction of a sentiment analysis model was implemented through the use of the Multinomial Naive Bayes algorithm. …”
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
A smart guidance indoor parking system based on Dijkstra's algorithm and ant colony algorithm
Published 2020“…Thus, to overcome these problems, a smart parking system should be designed and implemented. …”
Get full text
Get full text
Get full text
Article -
5
Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki
Published 2021“…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
Get full text
Get full text
Thesis -
6
Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm
Published 2020“…From the results, the different value of accuracy for both SVM and Naïve Bayes Algorithm was 2.4%. The Naïve Bayes Algorithm displayed better result comparing to SVM. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Meta-heuristic algorithms are search techniques used to solve complexoptimization problems, and these algorithms can help provide reasonable solutions in a shorter time thanexact methods. …”
Get full text
Get full text
Get full text
Article -
8
Naive bayes algorithm based e-mail spamming filtering system
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
9
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli
Published 2021“…With the rise of mobile technology and internet access, recent development in machine learning have designed many algorithms to solve diverse human problems. Many developers especially beginner student usually facing problem to find difficult. …”
Get full text
Get full text
Thesis -
12
An enhanced intelligent database engine by neural network and data mining
Published 2000“…The second problem is tackled by implementing two strengthening procedures, confidence and Bayes verification to filter out the unpredictive rules. …”
Get full text
Get full text
Article -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
14
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…There are various data mining tools available to analyze data related android malware detection. However, the problem arises in deciding the most appropriate machine learning techniques or algorithm on particular tools to be implemented on particular data. …”
Get full text
Get full text
Get full text
Article -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
16
Author identification for under-resourced language Kadazandusun
Published 2020“…The workflow of Author Identification implements the machine learning approach to solve the single-labelled multi-class problem and predict the author of a given message in KadazanDusun. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
18
Phishing attack detection using machine learning method
Published 2019“…The study of this algorithm is made thoroughly and the methods in implementing this algorithm have been discussed in detail. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Get full text
Article
