Search Results - (( java implementation level algorithm ) OR ( parameter classification bayes algorithm ))

Refine Results
  1. 1

    Airline flight delay prediction using Naïve Bayes algorithm / Ahmad Adib Baihaqi Shukri by Shukri, Ahmad Adib Baihaqi

    Published 2024
    “…Parameter tuning also done on Gaussian Naïve Bayes by changing its parameter. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Machine learning approach of predicting Airline flight delay using Naïve Bayes Algorithm / Ahmad Adib Baihaqi Shukri ... [et al.] by Shukri, Ahmad Adib Baihaqi, Mohamed Yusoff, Syarifah Adilah, Warris, Saiful Nizam, Abu Bakar, Mohd Saifulnizam, Kadar, Rozita

    Published 2024
    “…The performance of parameters tuning Gaussian Naïve Bayes model was compared with another two well-known algorithms which are K-Nearest Neighbors (KNN) and Support Vector Machine (SVM)). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…The comparative analysis is also conducted to discover the best classification model for prediction. From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Running-Related Injury Classification For Professional Runners by Lingam, Darwineswaran Raja

    Published 2021
    “…The RRI dataset was pre-processed to filter outliers and extreme values as well as irrelevant data attributes prior to the classification. Findings revealed that three best classifier algorithms with the highest accuracies to classify runners into the category of uninjured and injured are BayesNet (98.6457%), RandomForest (98.0107%), and (unpruned) J48 (97.1002%). …”
    Get full text
    Get full text
    Monograph
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Characterisation of pineapple cultivars under different storage conditions using infrared thermal imaging coupled with machine learning algorithms by Mohd Ali, Maimunah, Hashim, Norhashila, Abd Aziz, Samsuzana, Lasekan, Ola

    Published 2022
    “…Several types of machine learning algorithms were compared, including linear discriminant analysis, quadratic discriminant analysis, support vector machine, k-nearest neighbour, decision tree, and naïve Bayes, to obtain the best performance for the classification of pineapple cultivars. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), and support vector machine (SVM) have been used for IDS in the last decades. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…Without implementing any data reduction algorithm, the highest classification accuracy was found in SVM classifier with 79.55%. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Analysing the performance of classification algorithms on diseases datasets by Lydia E.L., Sharmil N., Shankar K., Maseleno A.

    Published 2023
    “…The proposed research papers examine the diseases through the disease parameters and classify them using various developed intense classification algorithms such as Support Vector Machine, Decision tree, Logistic Regression, K-nearest neighbor, Naive Bayes. …”
    Article
  13. 13

    Classification of Cognitive Frailty in Elderly People from Blood Samples using Machine Learning by Idris, S., Badruddin, N.

    Published 2021
    “…This paper proposes a machine learning model to classify patients into different levels of CF, using parameters from blood samples. A total of 7 different classification algorithms were used to predict between 6 levels of CF, the Robust and Non-Robust groups, as well as the Robust and Frail with MCI groups. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An improved multiple classifier combination scheme for pattern classification by Abdullah,

    Published 2015
    “…A compactness measure is introduced as a parameter in constructing an accurate and diverse classifier ensemble. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The integrated BayesNet ML-ADR fault classifier model eliminates the under-reach effect compromise on the zone-3 backup protection element for accurate fault detection, classification, and trip decision time reduction during far-end boundary faults. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  20. 20

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article