Search Results - (( data evaluation method algorithm ) OR ( data normalization learning algorithm ))

Refine Results
  1. 1

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Using only these 22% labeled training data, our proposed algorithm was able to classify the remaining 78% of the database into 16 classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Handgrip strength evaluation using neuro fuzzy approach by Seng, W.C., Chitsaz, M.

    Published 2010
    “…Multilevel Perception neural network utilizes the back-propagation learning algorithm is suitable to discover relationships and patterns in the dataset. …”
    Get full text
    Get full text
    Article
  4. 4

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model by Mohamad Hussin, Ummu Salmah

    Published 2004
    “…Another contribution in the preprocessing phase is in normalization phase. Three normalization methods are introduced to normalize the speech data before propagating to NN. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Trade-space exploration with data preprocessing and machine learning for satellite anomalies reliability classification by Mutholib, Abdul, Abdul Rahim, Nadirah, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2025
    “…Leveraging a Seradata dataset spanning 66 years and 4,455 satellite records, the framework systematically evaluates four data cleaning methods, four data transformation techniques, five normalization strategies, and seven machine learning algorithms across 480 configurations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multistage quality control in manufacturing process using blockchain with machine learning technique by Gu, J., Zhao, L., Yue, X., Arshad, N.I., Mohamad, U.H.

    Published 2023
    “…To this goal, a variety of machine learning algorithms are being studied. Data protection and monitoring is also another concern that is a critical component of the organization. …”
    Get full text
    Get full text
    Article
  12. 12

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Inversion of 2D and 3D DC resistivity imaging data for high contrast geophysical regions using artificial neural networks / Ahmad Neyamadpour by Neyamadpour, Ahmad

    Published 2010
    “…In the case of 3D study of pole - dipole data, the gradient descent with momentum and an adaptive learning rate algorithm is found to be the most efficient paradigm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Meta-cognitive Recurrent Recursive Kernel OS-ELM for concept drift handling by Liu, Zongying, Loo, Chu Kiong, Seera, Manjeevan

    Published 2019
    “…Meta-cognitive learning strategy decides when the incoming data needs to be updated, retrained, or discarded during learning and automatically finding ALD threshold that reduces the learning time of prediction model. …”
    Get full text
    Get full text
    Article
  16. 16

    Deep learning-based item classification for retail automation by Ling, Ji Xiang

    Published 2025
    “…The CNN model was optimized for both accuracy and speed, incorporating regularization techniques such as dropout and batch normalization. Real-time processing was achieved through the integration of object detection algorithms like YOLO and image segmentation techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    VGG16-based deep learning architectures for classification of lung sounds into normal, crackles, and wheezes using Gammatonegrams by Zakaria, Neili, Sundaraj, Kenneth

    Published 2023
    “…In addition, we performed data augmentation in our experiments using audio cycles from the ICBHI database to evaluate the performance of the proposed method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Risk prediction analysis for classifying type 2 diabetes occurrence using local dataset by Abd Rahman, M. Hafiz Fazren, Wan Salim, Wan Wardatul Amani, Abd-Wahab, Firdaus

    Published 2020
    “…In order to achieve this, several data pre-processing method is implemented to improve the model performance. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis