Search Results - (( simulation classification mining algorithm ) OR ( using function a algorithm ))

Refine Results
  1. 1

    RMIL/AG: A new class of nonlinear conjugate gradient for training back propagation algorithm by Basri, S.M.M., Nawi, N.M., Mamat, M., Hamid, N.A.

    Published 2018
    “…The RMIL uses the value of adaptive gain parameter in the activation function to modify the gradient based search direction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…Conservative regular moments have been proven to exhibit some shortcomings in the original formulations of moment functions in terms of scaling factor. Hence, an incorporated scaling factor of geometric functions into United Moment Invariant function is proposed for mining the feature of unconstrained words. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart... by Hamza H. M. , Altarturi

    Published 2023
    “…Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…Classification of imbalanced datasets remained a significant issue in data mining and machine learning (ML) fields. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Improving Classification Accuracy of Scikit-learn Classifiers with Discrete Fuzzy Interval Values by Hishamuddin, M.N.F., Hassan, M.F., Tran, D.C., Mokhtar, A.A.

    Published 2020
    “…Understanding machine learning (ML) algorithm from scratch is time consuming. Thus, many software and library packages such as Weka and Scikit-Learn have been introduced to help researchers run simulation on several amounts of well-known classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy by Ahmad Firdaus, Zainal Abidin, Aldharhani, Ghassan Saleh, Zahian, Ismail, Mohd Faizal, Ab Razak

    Published 2022
    “…We utilised The Fuzzy Lattice Reasoning (FLR) classifier for classification algorithms in machine learning. This experiment utilised actual cryptojacking samples and achieved a 100 percent detection accuracy rate in simulation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…Based on the results, the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article