Search Results - (( java application using algorithm ) OR ( based evaluation bayes algorithm ))
Search alternatives:
- java application »
- based evaluation »
- evaluation bayes »
- using algorithm »
- bayes algorithm »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
2
Airline flight delay prediction using Naïve Bayes algorithm / Ahmad Adib Baihaqi Shukri
Published 2024“…This study aims to study the Naïve Bayes algorithm for flight delay prediction. The objective is to develop a reliable flight delay prediction model using the Naïve Bayes algorithm and evaluate its performance. …”
Get full text
Get full text
Thesis -
3
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
Get full text
Get full text
Thesis -
4
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
5
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…We propose an integrated machine learning algorithm across K-Means clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
8
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
-
11
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
14
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021“…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
16
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
18
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…Naive Bayes, a probabilistic classifier based on Bayes' theorem, is particularly effective in handling large datasets and making accurate predictions. …”
Get full text
Get full text
Get full text
Article -
19
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section -
20
Evaluation of fall detection classification approaches
Published 2012“…The algorithms are Multilayer Perceptron, Naive Bayes, Decision tree, Support Vector Machine, ZeroR and OneR. …”
Get full text
Get full text
Conference or Workshop Item
