Search Results - (( network implementation bayes algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1
  2. 2

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Engine fault diagnosis using probabilistic neural network by Sheng, Zhu, Min, Keng Tan, Ka, Renee Yin Chin, Bih, Lii Chua, Xiaoxi, Hao, Tze, Kenneth Kin Teo

    Published 2021
    “…Therefore, this study would like to explore the feasibility of implementing auto fault diagnosis using Probabilistic Neural Network (PNN). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5

    Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli by Rosli, Mohamad Shafiq

    Published 2021
    “…There are many machines learning types and classification techniques have widely used nowadays such as Support Vector Machine, K-Nearest Neighbors, Neural Network and Naïve-Bayes Classifier are defined and studied. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The study of this algorithm is made thoroughly and the methods in implementing this algorithm have been discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An enhanced intelligent database engine by neural network and data mining by Chua, Boon Lay, Khalid, Marzuki, Yusof, Rubiyah

    Published 2000
    “…The second problem is tackled by implementing two strengthening procedures, confidence and Bayes verification to filter out the unpredictive rules. …”
    Get full text
    Get full text
    Article
  10. 10

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…An analysis was done to see the effect of implementing different data reduction algorithms in classifying BSR disease. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Using convolution neural networks for improving customer requirements classification performance of autonomous vehicle by Hao, Wang, Asrul, Adam, Fengrong, Han

    “…Most of conventional algorithms, such as, Naive Bayes, MAXENT, and support vector machine (SVM), only use limited human engineered features and their accuracy for customized corpus in sentences classification are proven low which is less than 50 percent. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance evaluation of intrusion detection system using selected features and machine learning classifiers by Raja Mahmood, Raja Azlina, Abdi, AmirHossien, Hussin, Masnida

    Published 2021
    “…Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. …”
    Get full text
    Get full text
    Article
  15. 15

    Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain by Mohammad Asif , Hossain

    Published 2022
    “…The selection would be made based on the hybrid machine learning (ML) algorithm. A fuzzy-based Naive Bayes algorithm has been used in this case. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Benchmarking performance of document level classification and topic modeling by Bhatti, Muhammad Shahid, Ullah, Azmat, Latip, Rohaya, Sohail, Abid, Riaz, Anum, Hassan, Rohail

    Published 2021
    “…Finally, we trained Multinomial Naïve Bayes, XGBoost, Bagging, and Deep dense neural network. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…The machine learning algorithms employed in this study encompass Convolutional Neural Networks (CNN), Logistic Regression, Naïve Bayes Classifier, Support Vector Machine, and Random Forest. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Mobile application: coin identification using machine learning / Dania Qistina Mohd Nazly by Mohd Nazly, Dania Qistina

    Published 2021
    “…The three machine learning types and classification techniques such as Support Vector Machine, K-Nearest Neighbors, Neural Network, and Naive-Bayes Classifier are defined and studied. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article