Search Results - (( program implementation function algorithm ) OR ( user classification based algorithm ))
Search alternatives:
- implementation function »
- program implementation »
- classification based »
- user classification »
- function algorithm »
-
1
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…This project implements the Naive Bayes algorithm as the classification algorithm. The classification is set to two categories: Eligible or Ineligible. …”
Get full text
Get full text
Book Section -
2
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Moreover, this work is extended to integrate the SPX crossover operator with the adaptive ARDE algorithm in a new way of implementation in order to make the adaptive ARDE algorithm satisfy both the global and local search requirements. …”
Get full text
Get full text
Thesis -
3
-
4
An adaptive ant colony optimization algorithm for rule-based classification
Published 2020“…Differing from other complex and difficult classification models, rules-based classification algorithms produce models which are understandable for users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Automatic email classification system / Phang Siew Ting
Published 2003“…Automatic Email Classification System is an email reader tool that implements machine learning algorithm in email classification, manipulated by a Graphical User Interface. …”
Get full text
Get full text
Thesis -
6
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. …”
Get full text
Get full text
Thesis -
7
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
8
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
A review on classifying and prioritizing user review-based software requirements
Published 2024“…This study highlights the need for better tools to handle complex user reviews. Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. …”
Get full text
Get full text
Get full text
Article -
10
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
11
A new classification model for online predicting users' future movements
Published 2008Get full text
Get full text
Conference or Workshop Item -
12
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research focuses on improving the prediction of the next visited web pages and introduces them to current anonymous user. An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
Get full text
Get full text
Thesis -
13
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
14
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
Get full text
Get full text
Article -
15
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Future development can be carried out by creating a database based on the user’s standard of measure and accessing it whenever the user starts the program.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
17
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
18
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
19
-
20
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis
