Search Results - (( simulation classification mining algorithm ) OR ( using function based algorithm ))

Refine Results
  1. 1

    RMIL/AG: A new class of nonlinear conjugate gradient for training back propagation algorithm by Basri, S.M.M., Nawi, N.M., Mamat, M., Hamid, N.A.

    Published 2018
    “…This paper introduced a new class of efficient second order conjugate gradient (CG) for training BP called Rivaie, Mustafa, Ismail and Leong (RMIL)/AG. The RMIL uses the value of adaptive gain parameter in the activation function to modify the gradient based search direction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…Conservative regular moments have been proven to exhibit some shortcomings in the original formulations of moment functions in terms of scaling factor. Hence, an incorporated scaling factor of geometric functions into United Moment Invariant function is proposed for mining the feature of unconstrained words. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart... by Hamza H. M. , Altarturi

    Published 2023
    “…Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…Classification of imbalanced datasets remained a significant issue in data mining and machine learning (ML) fields. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Improving Classification Accuracy of Scikit-learn Classifiers with Discrete Fuzzy Interval Values by Hishamuddin, M.N.F., Hassan, M.F., Tran, D.C., Mokhtar, A.A.

    Published 2020
    “…Understanding machine learning (ML) algorithm from scratch is time consuming. Thus, many software and library packages such as Weka and Scikit-Learn have been introduced to help researchers run simulation on several amounts of well-known classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20