Search Results - (( using action method algorithm ) OR ( data classification using algorithm ))

Refine Results
  1. 1

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…In this study, the experiment was conducted on five English educational websites. The created data sets are then classified using Naive-Bayes and C4.5 algorithms provided in WEKA application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
    Get full text
    Get full text
    Thesis
  4. 4

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…The comparative analysis is also conducted to discover the best classification model for prediction. From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…In model development, Ant-Miner was used which consists of three steps. In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
    Get full text
    Get full text
    Student Project
  6. 6

    An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles by Muhammad Qasim, Khan, Musse Mohamud, Ahmed, Ahmed Mohamed, Ahmed Haidar

    Published 2022
    “…Among different algorithms, this study focuses on modelling the non- recursive phasor estimation method in a power Simulink environment for a standard test system equipped with a developed algorithm to detect the fault zone. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Multi-layer perceptron (MLP) neural network trained using backpropagation algorithm is used to segment the color image. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…In this study, exhaustive empirical research of the machine learning algorithm for hand posture classification has been established. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…The performance is tested for human action recognition and scene classification. This is a crucial step as it is the first attempt of using fuzzy BK subproduct for classification. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Classification and prediction of obesity levels among subjects in Colombia, Peru, and Mexico using unsupervised and supervised learning by Suhaila, Bahrom, Anuar, Ab Rani, Aisyah Amalina, Mohd Noor

    Published 2024
    “…The study enhances understanding of obesity classification through machine learning and integrates data inspection, formatting, and exploration using Excel, Python, and graphical user interfaces (GUIs) such as SweetViz and PandaGui. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…Artificial intelligence systems are widely used to extract and analyze the complicated human actions through logical and mathematical rules. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol by Napiah, Mohamad Nazrin, Idris, Mohd Yamani Idna, Ramli, Roziana, Ahmedy, Ismail

    Published 2018
    “…These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. …”
    Get full text
    Get full text
    Article
  16. 16

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…Cross validation is used to find the best parameters related to kernels used followed by training and testing of the data sets. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing by Ramadhan, Rakhmat Sani

    Published 2014
    “…K-means algorithm grouping process by minimizing the distance between the data and designed can handle very large dataset also continuous and categorical variable for handling imbalanced dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis