Search Results - (( based evaluation a algorithm ) OR ( miner classification system algorithm ))

Refine Results
  1. 1

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive parameter control strategy for ant-miner classification algorithm by Al-Behadili, Hayder Naser Khraibet, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…This paper presents a new hybrid Ant-Miner classification algorithm and ant colony system (ACS), called ACS-Ant Miner. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…The Ant Miner system plays an important role in running the Ant Colony Optimization Algorithm and making comparison in this case study.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani by Che Ani, Siti Sarah Aqilah

    Published 2021
    “…Besides, in this study, the Ant-Miner system also plays an important role, which can train the data several times to achieve the highest percentage of predictive accuracy and make comparisons to achieve a good classification model. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…After testing and evaluation the prototype, the result shows that the Sudoku generator based on hybrid algorithm takes more times on solving the Sudoku. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions by Badaruddin, Muhammad, Zuwairie, Ibrahim, Kamarul Hawari, Ghazali, Mohd Riduwan, Ghazali, Kian, Sheng Lim, Sophan Wahyudi, Nawawi, Nor Azlina, Ab. Aziz, Marizan, Mubin, Norrima, Mokhtar

    Published 2014
    “…This paper presents a performance evaluation of Vector Evaluated Gravitational Search Algorithm (VEGSA), namely VEGSA-I and VEGSA-II algorithms, for multi-objective optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Sentiment analysis of customer reviews for Konda Kondi Cafe & Bistro by Abd Azizul Rahman, Munirah Syafiqah

    Published 2025
    “…The data was pre-processed using tokenization, stop-word removal, and stemming techniques to ensure quality inputs. Machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes (NB), and Decision Tree (DT) were applied using RapidMiner to build classification models. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique by Aljanaby, Alaa, Ku-Mahamud, Ku Ruhana, Md Norwawi, Norita

    Published 2008
    “…The new algorithm is based on the ant colony system and utilizes average and maximum pheromone evaluation mechanisms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…Therefore, for a new document, evaluation of algorithms is ineluctable. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility by Roshahliza, M. Ramli, Salina, Abdul Samad, Noor, Ali O. Abid

    Published 2018
    “…These systems can have dual inputs based on the conventional ANC structure or a single input based on the Adaptive Line Enhancer (ALE) structure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Distance evaluated simulated kalman filter with state encoding for combinatorial optimization problems by Yusof, Zulkifli Md., Ibrahim, Zuwairie, Adam, Asrul, Azmi, Kamil Zakwan Mohd, Ab. Rahman, Tasiransurini, Muhammad, Badaruddin, Ab. Aziz, Nor Azlina, Abd Aziz, Nor Hidayati, Mokhtar, Norrima, Shapiai, Mohd Ibrahim, Muhammad, Mohd Saberi

    Published 2018
    “…Simulated Kalman Filter (SKF) is a population-based optimization algorithm which exploits the estimation capability of Kalman filter to search for a solution in a continuous search space. …”
    Get full text
    Get full text
    Article
  19. 19

    Link utilization of GA-based QoS routing algorithm by Yussof S., See O.H.

    Published 2023
    “…In the previous work, a GA-based QoS routing algorithm has been proposed and the performance of the algorithm with respect to its ability to a find a feasible path has been evaluated. …”
    Conference paper
  20. 20

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper