Search Results - (( using machine learning algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- learning algorithm »
- application mining »
- java application »
- mining algorithm »
- machine »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
6
E4ML: Educational Tool for Machine Learning
Published 2003“…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
7
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Furthermore, the taxonomy was used to evaluate the most recent machine learning algorithm and analysis. …”
Article -
8
Mapping the distribution of oil palm using Landsat 8 data by comparing machine learning and non-machine learning algorithms
Published 2019“…Landsat 8 images of resolutions 15 x 15 m were used and classified via machine learning and non-machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
9
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…The scope of this study is tri folded, First, an exhaustive and parametric comparative study on a wide variety of machine learning algorithms is presented to evaluate the performance of machine learning algorithms in energy load prediction. …”
Get full text
Get full text
Thesis -
10
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis -
11
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
Published 2018“…There are many machine learning algorithms proposed for multi-category classification problems in the cancer diagnosis area. …”
Get full text
Get full text
Get full text
Article -
12
CLASSIFICATION OF BEARING FAULTS USING EXTREME LEARNING MACHINE ALGORITHMS
Published 2017“…Therefore, this project introduces three learning algorithms which are Extreme Learning Machine (ELM), Finite Impulse Response Extreme Learning Machine (FIR-ELM) and Discrete Fourier Transform Extreme Learning Machine (DFT-ELM) to improve the bearing fault diagnosis accuracy and shorten the time used to train and test the neural network.…”
Get full text
Get full text
Final Year Project -
13
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
14
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. …”
Get full text
Get full text
Article -
15
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. …”
Get full text
Get full text
Article -
16
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Octane number prediction for gasoline blends using convolution neural network / Zhu Yue
Published 2021“…Machine performance learning models depend to a large extant to the data quality used train the model. …”
Get full text
Get full text
Get full text
Thesis -
20
Phishing attack detection using machine learning method
Published 2019“…After a study has been made, machine learning method is used to prevent the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers
