Search Results - (( rule extraction method algorithm ) OR ( rate detection method algorithm ))

Refine Results
  1. 1

    Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection by Yap K.S., Wong S.Y., Tiong S.K.

    Published 2023
    “…The improved model is applied to two benchmark problems, and the rules extracted are analyzed, discussed and compared with other published methods. …”
    Conference Paper
  2. 2

    Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2021
    “…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm achieved an average of 87% precision, 83% of recall, 85% of F-score and 82% of accuracy rate.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…Meanwhile, with naïve bayes algorithm, the accurate rate has been improved by 0.6%. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
    Get full text
    Get full text
    Article
  9. 9

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…The rule generation algorithm (TopId) is proposed to identify topic for each verse based on the extracted terms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
    Get full text
    Get full text
    Article
  12. 12

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…The objective of this paper is to show the fourth step in the framework which applied the new electricity load forecasting rule extraction by WSBA method. Electricity load demand in Malaysia data is used as numerical data in this framework.These preliminary results show that the WSBA method can be one of alternative methods to extract fuzzy rules for forecast electricity load demand…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, R., Kasim, M.M., Othman, M.

    Published 2016
    “…These preliminary results show that the WSBA method can be one of alternative methods to extract fuzzy rules for forecast electricity load demand. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A weighted subsethood mamdani fuzzy rules based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand – a framework by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…Specifically, this paper proposed two frameworks: MFRBSWSBA and WSBA framework where the WSBA is embedded in MFRBS-WSBA (fourth step in MFRBS-WSBA).The objective of this paper is to show the fourth step in the MFRBS-WSBA framework which applied the new electricity load forecasting rule extraction by WSBA method.We apply the proposed WSBA framework in Malaysia electricity load demand data as a numerical example in this paper.These preliminary results show that the WSBA framework can be one of alternative methods to extract fuzzy rules for forecast electricity load demand where the proposed method provide a simple to interpret the fuzzy rules and also offer a new direction to interpret the fuzzy rules compared to classical fuzzy rules…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Overview of biomedical relations extraction using hybrid rule-based approaches. by Abdul Kadir, Rabiah, Bokharaeian, Behrouz

    Published 2013
    “…However, in this work we will discuss the overview a combination of three methods called as hybrid rule-based to extract complex and simple relations.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A weighted subsethood mamdani fuzzy rules based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand - A framework by Mansor, R., Mat Kasim, M., Othman, M.

    Published 2016
    “…These preliminary results show that the WSBA framework can be one of alternative methods to extract fuzzy rules for forecast electricity load demand where the proposed method provide a simple to interpret the fuzzy rules and also offer a new direction to interpret the fuzzy rules compared to classical fuzzy rules.…”
    Get full text
    Get full text
    Article