Search Results - (( java application testing algorithm ) OR ( learning implementation bayes algorithm ))

Refine Results
  1. 1

    Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm by Yusof, Norzihani, Rosidi, Siti Aishah Rosidi, Ibrahim, Nuzulha Khilwani Ibrahim, Ahmed Ali, Ahmed El-Mogtaba Bannga

    Published 2020
    “…From the results, the different value of accuracy for both SVM and Naïve Bayes Algorithm was 2.4%. The Naïve Bayes Algorithm displayed better result comparing to SVM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour by Pebrianti, Dwi, Ariawan, Angga, Bayuaji, Luhur, Mahdiana, Deni, ,, Rusdah

    Published 2022
    “…The single Classifier test with the Naïve Bayes algorithm produces the highest accuracy value of 72.7%, while using k-NN algorithm is 81.5%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This work employed the use of machine learning approach. Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…So,the selection of features is minimaland is not based on the previous learning process or what is known as heuristics. For this reason, in this research,several auxiliary algorithms are introduced to improve the performance of the classification algorithm, namely the meta-heuristic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Identification model for hearing loss symptoms using machine learning techniques by Nasiru Garba Noma

    Published 2014
    “…This research presents an efficient way to facilitate the hearing loss symptoms diagnosis process by designing a symptoms identification model that efficiently identify hearing loss symptoms based on air and bone conduction pure-tone audiometry data. The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Prediction of stroke disease using machine learning techniques / Syarifah Adilah Mohamed Yusoff ... [et al.] by Mohamed Yusoff, Syarifah Adilah, Warris, Saiful Nizam, Abu Bakar, Mohd Saifulnizam, Kadar, Rozita

    Published 2024
    “…This study has investigated five commonly used machine learning algorithm to be constructed as potential models for predicting stroke dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir by Amir, Nur Hazirah

    Published 2019
    “…The development model used for this project is Agile model development cycle. It implemented Supervised Learning algorithm with Bayes’ Theorem model for the calculation of mood prediction using Python programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The study of this algorithm is made thoroughly and the methods in implementing this algorithm have been discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli by Rosli, Mohamad Shafiq

    Published 2021
    “…With the rise of mobile technology and internet access, recent development in machine learning have designed many algorithms to solve diverse human problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Analysis of Data Mining Tools for Android Malware Detection by Yusof, Robiah, Abdullah, Raihana Syahirah, Adnan, Nurul Syahirrah, Abd. Jalil, Nurlaily

    Published 2019
    “…However, the problem arises in deciding the most appropriate machine learning techniques or algorithm on particular tools to be implemented on particular data. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  18. 18

    Emotion recognition and analysis of netizens based on micro-blog during covid-19 epidemic by Jiao, BianBian, Leelavathi, R., Lohgheswary, N., Nopiah, Z. M.

    Published 2022
    “…This research uses machine learning algorithm combined with statistical analysis to analyze current events in real time. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Author identification for under-resourced language Kadazandusun by Nursyahirah, Tarmizi, Suhaila, Saee, Dayang Hanani, Abang Ibrahim

    Published 2020
    “…Besides, this paper also examines the performance of two machine learning algorithms on the KadazanDusun data set by analyzing the stylometric features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
    Get full text
    Get full text
    Get full text
    Article