Search Results - (( using motivation mining algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
    Get full text
    Get full text
    Article
  3. 3

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…These results can be seen as further explanation on the success of Truncated Newton method in TR-KLR and TR Iteratively Re-weighted Least Square (TR-IRLS) algorithm respectively, because of the equivalence of iterative method used by these algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart... by Hamza H. M. , Altarturi

    Published 2023
    “…The Cyber Parental Control Framework (CPCF) employs a multistep approach and a novel web mining technique. It uses the URL blacklist and whitelist methods as the first and second filter layers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Identifying Features Eligiblity For Blood Donors' Preferences Using Artificial Neural Networks Prediction Performances by Che Khalid, Nor Syuhada

    Published 2017
    “…Another least preferences recommended by FA are donation fear, favourite donation center, marriage status, up to date donation, interested to overcome donation fear, high overall donation volume, and donation motivation by celebrities. These findings of this study contribute as beneficial information to improve blood donation or healthcare service, as guide to collect and arrange data into prediction or another data mining problems, and extend another study for flexible algorithms with various datasets.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An early warning system for students at risk using supervised machine learning by Yam, Zheng Hong, Mohd Norshahriel, Abd Rani, Nabilah Filzah, Mohd Radzuan, Lim, Huay Yen, Sarasvathi, Nagalingam

    Published 2024
    “…To keep up with the course's pace, students must be self-motivated, well-organized, and have time management skills. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Performance Prediction of Compulsory Subjects and Recommendation of Subject Options for China’s New College Entrance Examination by Long, Wang

    Published 2026
    “…Four machine learning algorithms: Naïve Bayes (NB), Decision Tree (DT), Artificial Neural Networks (ANNs), and Support Vector Machines (SVMs) were evaluated using accuracy, precision, recall, F1 score, and Matthews Correlation Coefficient (MCC). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar by Noor Hasrina, Bakar

    Published 2016
    “…In phase 3, Latent Semantic Analysis (LSA) and tfidf term weighting are used in order to determine document relatedness. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A coherent knowledge-driven deep learning model for idiomatic - aware sentiment analysis of unstructured text using Bert transformer by Bashar M. A., Tahayna

    Published 2023
    “…Sentiment analysis algorithms used to classify the sentiment of tweets on social media platforms such as Twitter face challenges when dealing with idiomatic expressions and figurative language used by users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis