Search Results - (( java implementation learning algorithm ) OR ( using simple mining algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…The PC_Miner algorithm traverses the PC_Tree by using an efficient pruning technique. …”
    Get full text
    Get full text
    Article
  3. 3

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…This thesis aims to develop the simple and effective imbalanced classification algorithms by previously improving the algorithms performance of general classifiers i.e. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…The objectives of this research are data mining are used to extract useful data from sales and product. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure by Asmai, S. A.

    Published 2014
    “…The other 40% of the dataset is used to test generated rules. A simple program of C++ is implemented using Microsoft Visual Studio to test generated rules until accuracy of performance is obtained. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo by Terence, Yong Koon Beh, Swee, Chuan Tan, Hwee, Theng Yeo

    Published 2014
    “…We evaluated the models generated from seven classification algorithms with two simple data balancing techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A direct ensemble classifier for imbalanced multiclass learning by Sainin, Mohd Shamrie, Alfred, Rayner

    Published 2012
    “…Researchers have shown that although traditional direct classifier algorithm can be easily applied to multiclass classification, the performance of a single classifier is decreased with the existence of imbalance data in multiclass classification tasks.Thus, ensemble of classifiers has emerged as one of the hot topics in multiclass classification tasks for imbalance problem for data mining and machine learning domain.Ensemble learning is an effective technique that has increasingly been adopted to combine multiple learning algorithms to improve overall prediction accuraciesand may outperform any single sophisticated classifiers.In this paper, an ensemble learner called a Direct Ensemble Classifier for Imbalanced Multiclass Learning (DECIML) that combines simple nearest neighbour and Naive Bayes algorithms is proposed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A comparative study of the classification of skin burn depth in human by Kuan, Pei Nei, Li, Stephanie Chua Hui, Ehfa, binti Bujang Safawi, Wang, Hui Hui, Tiong, Wei King

    Published 2017
    “…Empirical results showed that the best classification algorithms that were able to classify most of the burn depths using a supplied test set were Logistic, Simple Logistic, MultiClassClassifier, OneR, and LMT, with an average accuracy of 68.9% whereas for 10-fold cross validation evaluation, the best result was obtained through the Simple Logistic algorithm with an average accuracy of 73.2%. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Ant colony algorithm for web page classification by Moayed, Majid Javid, Sabery, A. Hamid, Khanteymoory, Alireza

    Published 2008
    “…Ant Miner II is the used algorithm. It also propose a simple text preprocessing technique to reduce the large numbers of attributes associated with web content mining, without dealing linguistic complications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Simple quantum circuit for pattern recognition based on nearest mean classifier by Mahmoud Ahmed, Gharib Subhi, Messikh Azeddine, Azeddine

    Published 2016
    “…Lett. 114, 140504 (2015)] which uses quantum matrix inverse algorithm to find optimal hyperplane that separated two different classes. …”
    Get full text
    Get full text
    Article
  18. 18

    Data Mining Approach To Classify Covid-19 Severity By Clinical Symptoms by Kanyan, Laura Jasmine Thomas

    Published 2021
    “…Missing values were treated using filtering and imputation methods. The classification algorithms: J48, SMO, Random Forest, and Simple Logistic were executed and tested to classify data into three classes: mild, moderate, and severe. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports by Sari, Y., Hassan, M.F., Zamin, N.

    Published 2009
    “…The UTP's HSE reports are the investigation reports which contain the information on incidents and accidents occurred during the daily operations. Many algorithms have been reported for NER ranging from simple statistical methods to advanced Natural language Processing (NLP) methods. …”
    Get full text
    Get full text
    Conference or Workshop Item