Search Results - (( miner classification system algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- classification system »
- miner classification »
- system algorithm »
- java application »
-
1
Adaptive parameter control strategy for ant-miner classification algorithm
Published 2020“…This paper presents a new hybrid Ant-Miner classification algorithm and ant colony system (ACS), called ACS-Ant Miner. …”
Get full text
Get full text
Get full text
Article -
2
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…The Ant Miner system plays an important role in running the Ant Colony Optimization Algorithm and making comparison in this case study.…”
Get full text
Get full text
Thesis -
3
Predicting heart disease using ant colony optimization / Siti Aisyah Ismail
Published 2021Get full text
Get full text
Student Project -
4
Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani
Published 2021“…Besides, in this study, the Ant-Miner system also plays an important role, which can train the data several times to achieve the highest percentage of predictive accuracy and make comparisons to achieve a good classification model. …”
Get full text
Get full text
Student Project -
5
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Sentiment analysis of customer reviews for Konda Kondi Cafe & Bistro
Published 2025“…The data was pre-processed using tokenization, stop-word removal, and stemming techniques to ensure quality inputs. Machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes (NB), and Decision Tree (DT) were applied using RapidMiner to build classification models. …”
Get full text
Get full text
Student Project -
9
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
