Search Results - (( data extraction learning algorithm ) OR ( parameter evaluation method algorithm ))

Refine Results
  1. 1

    Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review by Goh, Choon-Hian, Ferdowsi, Mahbuba, Gan, Ming Hong, Kwan, Ban-How, Lim, Wei Yin, Tee, Yee Kai, Rosli, Roshaslina, Tan, Maw Pin *

    Published 2024
    “…Extracted data encompassed subject count, age range, syncope protocols, ML type, hemodynamic parameters, and performance metrics. …”
    Get full text
    Get full text
    Article
  2. 2

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Context enrichment framework for sentiment analysis in handling word ambiguity resolution by Yusof, Nor Nadiah

    Published 2024
    “…Machine learning algorithms are deployed to perform sentiment classification. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Then, by means of the Slantlet Transform theory, the matrix data extraction for any decomposition level are computed and the best of them are selected as input data to feed to an effective classifier. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Task-state EEG signal classification for spatial cognitive evaluation based on multiscale high-density convolutional neural network by Wen, Dong, Li, Rou, Tang, Hao, Liu, Yijun, Wan, Xianglong, Dong, Xianling, Saripan, M. Iqbal, Lan, Xifa, Song, Haiqing, Zhou, Yanhong

    Published 2022
    “…Besides, the multi-dimensional conditional mutual information method was used to extract the frequency band features of the EEG data. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Image Splicing Detection With Constrained Convolutional Neural Network by Lee, Yang Yang

    Published 2019
    “…Nowadays there are many related efforts in detecting spliced images, but most of them are either feature-specific or complicated algorithms. Constrained CNN is basically a Deep Learning CNN model with its first layer weights being constrained so that it only extracts splicing manipulation features instead of object features. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…This paper proposes a sophisticated Job Position Prediction system utilizing Machine Learning algorithms and leveraging data from LinkedIn profiles. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The finding in this project is the k-NN algorithm is good feature extraction and classifier. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms by Anuar N.K., Bakar A.A., Ahmad A.R., Yussof S., Rahim F.A., Ramli R., Ismail R.

    Published 2023
    “…Data Analytics; Data mining; Decision making; Feature extraction; Machine learning; Predictive analytics; Privacy by design; Features selection; Fine grains; No leakages; Predictive modeling; Privacy preserving; Learning algorithms…”
    Conference Paper
  14. 14
  15. 15

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Osman, Miszaina

    Published 2019
    “…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An Improvement on Extended Kalman Filter for Neural Network Training by Tsan, Ken Yim

    Published 2005
    “…Extracting useful imformation and knowledge from data is a major concern in information science. …”
    Get full text
    Get full text
    Thesis