Search Results - (( data extraction method algorithm ) OR ( data implication machine algorithm ))

Refine Results
  1. 1

    Temporal - spatial recognizer for multi-label data by Mousa, Aseel

    Published 2018
    “…The imHTM (Improved HTM) method includes improvement in two of its components; feature extraction and data clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida Abdullah, Nur Haizum Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida, Abdullah, Nur Haizum, Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Systematic review for phonocardiography classification based on machine learning by Altaf, Abdullah, Mahdin, Hairulnizam, Alive, Awais Mahmood, Ninggal, Mohd Izuan Hafez, Altaf, Abdulrehman, Javid, Irfan

    Published 2023
    “…This systematic review aims to examine the existing literature on phonocardiography classification based on machine learning, focusing on algorithms, datasets, feature extraction methods, and classification models utilized. …”
    Get full text
    Get full text
    Article
  9. 9

    Systematic Review for Phonocardiography Classification Based on Machine Learning by Abdullah Altaf, Abdullah Altaf, Hairulnizam Mahdin, Hairulnizam Mahdin, Awais Mahmood Alive, Awais Mahmood Alive, Mohd Izuan Hafez Ninggal, Mohd Izuan Hafez Ninggal, Abdulrehman Altaf, Abdulrehman Altaf, Irfan Javid, Irfan Javid

    Published 2023
    “…This systematic review aims to examine the existing literature on phonocardiography classification based on machine learning, focusing on algorithms, datasets, feature extraction methods, and classification models utilized. …”
    Get full text
    Get full text
    Article
  10. 10

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Secondly, four different testing scenarios are chosen to acquire pedestrian walking data using the gyroscope sensor, where the essential features were extracted and selected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Secondly, four different testing scenarios are chosen to acquire pedestrian walking data using the gyroscope sensor, where the essential features were extracted and selected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Prediction of payment method in convenience stores using machine learning by Pratondo, Agus, Novianty, Astri, Pudjoatmodjo, Bambang

    Published 2023
    “…This study explores the application of machine learning techniques, specifically the Random Forest algorithm, to predict payment modes in the context of the Indonesian community. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20