Search Results - (( using case method algorithm ) OR ( based classifications using algorithm ))

Refine Results
  1. 1

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient and effective case classification method based on slicing by Shiba, Omar A. A., Sulaiman, Md. Nasir, Mamat, Ali, Ahmad, Fatimah

    Published 2006
    “…The paper also studies the comparison between the proposed method and the two selected classification algorithms using several domains.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications by Hamza Awad, Hamza Ibrahim, Sulaiman, Mohd Nor, Izzeldin, I. Mohd, Mohamed Saad, Mahoub, Haitham, A. Jamil

    Published 2014
    “…In addition, as demonstrated in the real time online experiments done, SSPC algorithm uses a short time to classify traffic and thus it is suitable to be used for online classification.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…The comparison showed that, the accuracy of the unsupervised classification map with value of 88.4% that was generated by using the cluster labelling algorithm was slightly more than the maximum-likelihood supervised classification map with value of 87.5%. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. …”
    Get full text
    Thesis
  7. 7

    Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm by Yusof, Norzihani, Rosidi, Siti Aishah Rosidi, Ibrahim, Nuzulha Khilwani Ibrahim, Ahmed Ali, Ahmed El-Mogtaba Bannga

    Published 2020
    “…The classification for this thematic Hadith dataset is implemented using Rapidminer, a machine learning tool using Naïve Bayes and Support Vector Machine (SVM) methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Region-growing based segmentation and bag of features classification for breast ultrasound images by Lee, Lay Khoon

    Published 2017
    “…For the preprocessing stage, median filtering has been used to reduce the noise in ultrasound. In the next stage, which is the segmentation stage, region growing algorithm is used to automatically detect tumors in ultrasound images. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Detection of corneal arcus using rubber sheet and machine learning methods by Ramlee, Ridza Azri

    Published 2019
    “…The classification algorithms such as the Lavenberg-Marquardt (LM), Bayesian regularization (BR), scaled conjugate gradient (SCG) and one model of bag-of-features (BoF) are used in this research. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Deep learning object detector using a combination of Convolutional Neural Network (CNN) architecture (MiniVGGNet) and classic object detection algorithm by Ismail, Asmida, Ahmad, Siti Anom, Che Soh, Azura, Hassan, Mohd Khair, Harith, Hazreen Haizi

    Published 2020
    “…The performance of this method can work in some specific use cases and effectively solving the problem of the inaccurate classification and detection of typical features.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Backpropagation algorithm for classification problem: academic performance prediction model for UiTM Melaka Mengubah Destini Anak Bangsa (MDAB) program. / Fadhlina Izzah Saman, Nur... by Saman, Fadhlina Izzah, Zainuddin, Nurulhuda, Md Shahid, Khairiyah

    Published 2012
    “…Multilayer perceptrons (MLPs) is one of the topology used for processing ANN, while backpropagation algorithm is one of the most popular methods in training MLPs. …”
    Get full text
    Get full text
    Research Reports
  17. 17

    Breast cancer detection by using associative classifier with rule refinement method based on relevance feedback by Abubacker, Nirase Fathima, Azman, Azreen, Doraisamy, Shyamala, Azmi Murad, Masrah Azrifah

    Published 2022
    “…Several researchers have proposed the use of associative classifier that generates strong associations between features and reveals hidden relationship that can be missed by other classification algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    Information Theoretic-based Feature Selection for Machine Learning by Muhammad Aliyu, Sulaiman

    Published 2018
    “…The second test evaluates IFS in a controlled study using simulated datasets. Moreover, the third test used ten natural domain datasets obtained from UCI Repository, in about fifteen different experiments, using three to four different Machine Learning Algorithms for performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Decision tree as knowledge management tool in image classification by Kusrini, , Harjoko, Agus

    Published 2008
    “…Expert System has been grown so fast as a science that study how to make computer capable of solving problems that typically can only be solved by expert.It has been realized that the biggest challenge of developing expert system is the process include expert’s knowledge into the system.This research tries to model expert’s knowledge management using case based reasoning method.The knowledge itself is not inputted directly by the expert, but rather the system will learn the knowledge from what the expert did to the previous cases.This research takes image classification as the problem to be solved.As the knowledge development technique, we build decision tree by using C4.5 algorithm.Variables used for building the decision tree are the image visual features.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. Using two different watermarks lead to a good classification of incidental and malicious modifications and locating the tampered areas. …”
    Get full text
    Get full text
    Thesis