Search Results - (( motion evaluation tool algorithm ) OR ( miner classification system algorithm ))

Refine Results
  1. 1

    Adaptive parameter control strategy for ant-miner classification algorithm by Al-Behadili, Hayder Naser Khraibet, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…This paper presents a new hybrid Ant-Miner classification algorithm and ant colony system (ACS), called ACS-Ant Miner. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…The Ant Miner system plays an important role in running the Ant Colony Optimization Algorithm and making comparison in this case study.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani by Che Ani, Siti Sarah Aqilah

    Published 2021
    “…Besides, in this study, the Ant-Miner system also plays an important role, which can train the data several times to achieve the highest percentage of predictive accuracy and make comparisons to achieve a good classification model. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    IMPACT OF NUMBER OF ATTRIBUTES ON THE ACCURACY OF HUMAN MOTION CLASSIFICATION by Chan, Choon K, Girma, T. Chala*

    Published 2018
    “…The impact of the number of attributes on classification accuracy is evaluated via Bayes, Function, Lazy, Meta, Rule and Trees classifier algorithms supported by the WEKA tool. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Data-driven fractional-order PID controller tuning for liquid slosh suppression using marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali, Shahrizal, Saat

    Published 2023
    “…The proposed data-driven tuning tool demonstrates superior performance compared to other recent metaheuristic optimization algorithms across the majority of evaluation criteria.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm by Mohd Tumari, Mohd Zaidi Mohd, Mustapha, Nik Mohd Zaitul Akmal, Ahmad, Mohd Ashraf, Saat, Shahrizal, Ghazali, Mohd Riduwan

    Published 2023
    “…We have shown that the proposed data-driven tuning tool has a good ability in producing better results for the majority of the performance criteria as compared to other recent metaheuristic optimization algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A study on model-free approach for liquid slosh suppression based on stochastic approximation by Ahmad, Mohd Ashraf

    “…Here, a Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm is suggested as a promising tool for the model-free control approach. …”
    Get full text
    Get full text
    Research Report
  13. 13

    Development of a computer vision-based technique for analysis of hand therapy exercise by Muhammad Zabri, Abu Bakar

    Published 2018
    “…The aim of this research is to develop a computer vision-based technique for analysis of hand therapy exercise and to evaluate the propose angle measurement with the conventional measurement tool, which is goniometer. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Liquid slosh suppression by implementing data-driven fractional order PID controller based on marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali, Nik Mohd Zaitul Akmal, Mustapha, Shahrizal, Saat

    Published 2023
    “…We have shown that the proposed data-driven tuning tool has a good ability in producing better results for the majority of the performance criteria as compared to other recent metaheuristic optimization algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Development of data-driven controller for slosh suppression in liquid cargo vehicles by Mohd Falfazli, Mat Jusof, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Suid, Mohd Helmi, Saari, Mohd Mawardi

    “…Here, a Safe Experimentation Dynamics (SED) algorithm is suggested as a promising tool for the data-driven control approach. …”
    Get full text
    Get full text
    Research Report
  16. 16

    Gait pattern detection for amputated prosthetic using fuzzy algorithm by Abdullah, Ahmad Faisal

    Published 2015
    “…The data acquired from the motion tests was displayed graphically through GUI MATLAB. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Sentiment analysis of customer reviews for Konda Kondi Cafe & Bistro by Abd Azizul Rahman, Munirah Syafiqah

    Published 2025
    “…The data was pre-processed using tokenization, stop-word removal, and stemming techniques to ensure quality inputs. Machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes (NB), and Decision Tree (DT) were applied using RapidMiner to build classification models. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Tubular Linear Switched Reluctance Actuator: Design And Characterization by Yeo,, Chin Kiat

    Published 2019
    “…Next, the force and motion characteristics of the tubular LSRA are evaluated to verify the actuator design and the behaviour of the tubular LSRA is obtained through the open loop experiment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis