Search Results - (( data implication ((from algorithm) OR (svm algorithm)) ) OR ( java application tree algorithm ))

Refine Results
  1. 1

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida Abdullah, Nur Haizum Abd Rahman

    Published 2025
    “…The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida, Abdullah, Nur Haizum, Abd Rahman

    Published 2025
    “…The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection by Bouke, Mohamed Aly, Alramli, Omar Imhemed, Abdullah, Azizol

    Published 2024
    “…Traditional machine learning algorithms such as Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Trees (DT), and Support Vector Machines (SVM) have been employed to mitigate this challenge. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…The existing fuzzy implication operators are capable of handling only two dimensional data. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu by Md. Yunus, Aida Suraya

    Published 2001
    “…This study discusses the algorithms in multiplication involving decimal numbers from the perspectives of Form One students. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
    Get full text
    Get full text
    Article