Search Results - (( knowledge utilization classification algorithm ) OR ( java adaptation optimization algorithm ))

Search alternatives:

Refine Results
  1. 1

    Knowledge base processing method based on text classification algorithm by Baisheng Zhong, Mohd Shamrie Sainin, Tan Soo Fun

    Published 2023
    “…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    A Conceptual Framework of Bacterial Foraging Optimization Algorithm for Data Classification by Hossin, M., Mohd Suria, F.

    Published 2016
    “…To the best of our knowledge, no effort has been carried out to fully utilize BFOA as a classifier. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  4. 4

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…Feature selection and classification are widely utilized for data analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Region-growing based segmentation and bag of features classification for breast ultrasound images by Lee, Lay Khoon

    Published 2017
    “…The algorithm has been utilized in the experiment to classify the type of tumor. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Image classification of Aedes mosquitoes using transfer learning / Zetty Ilham Abdullah by Abdullah, Zetty Ilham

    Published 2021
    “…Transfer learning concept in machine learning has been shown to improve learning of the targeted task by extending the original algorithm with knowledge gathered from the initial training to improve the performance of new model. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The proposed algorithm has utilized the advantages of both algorithms to balance the exploration and exploitation search process. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article