Search Results - (( user evaluation tree algorithm ) OR ( identification _ mining algorithm ))

Refine Results
  1. 1

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  2. 2

    Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A... by Hamsani, Aqil Khairy, Mohd Bahrin, Ummu Fatihah, Wan Abdul Manan, Wan Dorishah

    Published 2023
    “…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm by Abdulwahid S., Mahmoud M.A., Abdulwahid N.

    Published 2023
    “…Classification (of information); Data mining; Digital forensics; Forestry; Learning algorithms; Loudspeakers; Motion compensation; Nearest neighbor search; Speech recognition; Trees (mathematics); K-near neighbor; Logistic model tree; Logistics model; Mel frequency cepstral co-efficient; Mel frequency cepstral coefficient; Mel-frequency cepstral coefficients; Mining classification; Model trees; Nearest-neighbour; Speaker identification systems; Authentication…”
    Conference Paper
  7. 7
  8. 8

    A regulative norms mining algorithm for complex adaptive system by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mostafa S.A.

    Published 2023
    “…Adaptive systems; Soft computing; Complex adaptive systems; Exceptional events; Mining algorithms; Normative system; Norms identifications; Regulative norms; Social norm; Data mining…”
    Conference Paper
  9. 9

    Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu by Yusnita, Muhamad Noor

    Published 2018
    “…These results proved that the algorithm and model, for syntactic tree output enhancement, are generalisable enough to be tested on other languages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Context identification of scientific papers via agent-based model for text mining (ABM-TM) by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
    Article
  11. 11
  12. 12

    Discovering association rules for mining images datasets: a proposal by Hamzah, Azizi, O. K. Rahmat, Rahmita Wirza, Sulaiman, Md. Nasir

    Published 2005
    “…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20