Search Results - (( mining classification problems algorithm ) OR ( using application system algorithm ))

Refine Results
  1. 1

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…The components of the AIRS2 algorithm that pose problems will be modified. This thesis proposes three new hybrid algorithms: The FRA-AIRS2 algorithm uses fuzzy logic to improve data reduction capability of AIRS2 and to solve the linearity problem associated with resource allocation of AIRS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…Works on sustaining the interestingness of rules generated by data mining algorithms are actively and constantly being examined and developed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Mine Blast Algorithm (MBA) which has been improved by Improved MBA (IMBA) can be further improved by modifying its exploitation phase. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…Hence, it is required to develop effective imbalanced LR-based methods to be widely used in data mining applications. Numerical results have showed that the use of Truncated Newton method for KLR-NR and RLR-NR which respectively resulted in Newton Truncated Regularized KLR (NTR-KLR) and NTR RLR (NTR-LR), is effective in handling the numerical problems on the huge matrix of linear system of Newton-Raphson update rule i.e. the training time and the singularity problem. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An efficient and effective case classification method based on slicing by Shiba, Omar A. A., Sulaiman, Md. Nasir, Mamat, Ali, Ahmad, Fatimah

    Published 2006
    “…The paper also discusses two of common classification algorithms that are used either in data mining or in general AI. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Therefore, the RF classification model is chosen to be integrated into the Intent-IQ system. The validation and functionality testing conducted on the system reflects that the system works as expected. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
    Get full text
    Get full text
    Book Chapter
  10. 10

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Improved GART neural network model for pattern classification and rule extraction with application to power systems by Yap K.S., Lim C.P., Au M.T.

    Published 2023
    “…In this paper, we propose an improved GART model (IGART), and demonstrate its applicability to power systems. IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
    Article
  12. 12

    Rough Set Discretize Classification of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…In rough set, there are several stage processing including discretization part which is a vital task in data mining, particularly in the classification problem. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Feature selection methods application towards a new dataset based on online student activities / Muhammad Hareez Mohd Zaki ... [et al.] by Mohd Zaki, Muhammad Hareez, Abdul Aziz, Mohd Azri, Sulaiman, Suhana, Hambali, Najidah

    Published 2023
    “…The increasing usage of classification algorithms has encouraged researchers to explore many topics including academic-related topics. …”
    Get full text
    Get full text
    Article
  16. 16

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…In order to improve recognition of high interclass similarity activities, One-Versus- All (OVA) binarization strategy is introduced by transforming original multi-class classification problems into a series of two-class classification problems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  20. 20

    Pendiskretan data set kasar menggunakan ta’akulan boolean by Rokiah @ Rozita Ahmad, Maslina Darus, Siti Mariyam Shamsuddin, Azuraliza Abu Bakar

    Published 2004
    “…Data discretization of rough set towards real attribute values is one of the important aspect in the data mining concepts, particularly the ones which involved classification problems. …”
    Get full text
    Get full text
    Get full text
    Article