Knowledge Engineering and Data Science (KEDS) pISSN 2597-4602 Vol 6, No 1, April 2023, pp. 69–78 eISSN 2597-4637 https://doi.org/10.17977/um018v6i12023p69-78 ©2023 Knowledge Engineering and Data Science | W : http://journal2.um.ac.id/index.php/keds | E : keds.journal@um.ac.id This is an open access article under the CC BY-SA license (https://creativecommons.org/licenses/by-sa/4.0/) K-Means Clustering and Multilayer Perceptron for Categorizing Student Business Groups Miftahul Walid a,1,*, Norfiah Lailatin Nispi Sahbaniya a,,2, Hozairi a,3, Fajar Baskoro b,4, Arya Yudhi Wijaya b,5 a Department of Informatics, Faculty of Engineering, Madura Islamic University, JL. Pondok Peantren Miftahul Ulum Bettet, Pamekasan 69317, Indonesia b Department of Informatics, Faculty of Electrical Technology and Intelligent Informatics, Sepuluh Nopember Institute of Technology, Jl. Teknik Kimia, Surabaya 60117, Indonesia 1 miftahul.walid@uim.ac.id*; 2 norfiah210@gmail.com; 3 dr.hozairi@gmail.com; 4 baskoro@gmail.com; 5 arya.wijaya@gmail.com * corresponding author I. Introduction SMA Double Track is a flagship program of East Java Province in the field of education that is packaged as an extracurricular activity in senior high schools aimed at developing students' entrepreneurial skills. In this activity, students will learn about the skills they are interested in and the ins and outs of the business and gain real-life experience in running a business. So, even if they cannot continue their higher education, they can establish their businesses or work in their local area according to their acquired skills [1]. However, it is necessary to pay attention to the challenges of these activities, which include infrastructure, resources, curriculum management, and the perception and understanding of the community towards the educational program. The training method for SMA Double Track utilizes a group system called Student Business Group (KUS), with each KUS consisting of 5–6 students. The aim is for each student to have a role and responsibilities in running their business. The target is for each KUS to be capable of selling products or services resulting from their training to the community, thus enabling them to generate transactions or revenue. Each year, the number of transactions for each KUS per topic is recorded by the East Java Provincial Education Office to determine the potential for developing students' businesses into start-up companies that will receive business capital assistance. KUS in the SMA Double Track system is crucial in providing ARTICLE INFO A B S T R A C T Article history: Received 10 June 2023 Revised 10 July 2023 Accepted 19 August 2023 Published online 18 September 2023 The research conducted in this study was driven by the East Java provincial government's requirement to assess the transaction levels of the Student Business Group (KUS) in the SMA Double Track program. These transaction levels are a basis for allocating supplementary financial aid to each business group. The system's primary objective is to assist the provincial government of East Java in making well- informed choices pertaining to the distribution of supplementary capital to the KUS. The classification technique employed in this study is the multilayer perceptron. However, the K-Means Clustering method is utilised to generate target data due to the limited availability during the classification process, which involves dividing the transaction level attributes into three distinct groups: (0) low transactions, (1) medium transactions, and (2) high transactions. The clustering process encompasses three distinct features: (1) income, (2) spending, and (3) profit. These three traits will be utilized as input data throughout the categorization procedure. The classification procedure employing the Multilayer Perceptron technique involved processing a dataset including 1383 data points. The training data constituted 80% of the dataset, while the remaining 20% was allocated for testing. In order to evaluate the efficacy of the constructed model, the training error was assessed using K-Fold cross-validation, yielding an average accuracy score of 0.92. In the present study, the categorization technique yielded an accuracy of 0.96. This model aims to classify scenarios when the dataset lacks prior target data. This is an open access article under the CC BY-SA license (https://creativecommons.org/licenses/by-sa/4.0/). Keywords: Student Business Groups K-Means Clustering Multilayer Perceptron Transaction Level Classification http://u.lipi.go.id/1502081730 http://u.lipi.go.id/1502081046 http://journal2.um.ac.id/index.php/keds mailto:keds.journal@um.ac.id https://creativecommons.org/licenses/by-sa/4.0/ https://creativecommons.org/licenses/by-sa/4.0/ Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 70 students with practical experience and entrepreneurial opportunities. The activity has a positive impact on students, including providing them with the opportunity to apply the knowledge they have acquired in real-life situations, helping them develop crucial entrepreneurial skills for their future, and creating a collaborative environment where students can work together in teams, share ideas, and build strong networks. Students can also enhance their self-confidence by facing challenges and taking risks. KUS can serve as a means to implement integrated learning among the subjects taught in the academic and vocational tracks. The SMA Double Track program has many KUS, making it difficult for the province government to assess the volume of transactions, which influences the decision to provide more cash to each KUS. Consequently, the provincial government needs a transaction classification system to make decision-making easier. The Convolutional Neural Networks-Recurrent Neural Network (CNN- RNN) resulted in an accuracy value of 75% [2]. Long Short-Term Memory (LSTM) yielded satisfactory precision, recall, and f1-score values [3]. The use of K-Nearest Neighbors (K-NN), CNN, LSTM indicated that the KNN algorithm performed the best among the machine learning algorithms in this case, achieving an accuracy of 83.82% [4]. Supervised machine learning models, including linear, non-linear, and ensemble models classified harmful and non-harmful activities. This study showed that linear and non-linear machine learning outperformed ensemble learning in classifying Ethereum blockchain addresses [5]. All methodologies are contingent upon the availability and utilization of data. The classification [6][7] research that has been conducted requires input data and target data. However, the transaction data from the SMA DT, KUS, does not have target data yet. Therefore, a method is needed to create target data. Hence, in this study, a combination of methods is employed to classify the transaction levels of the KUS. The methods used in this research are K-Means Clustering and Multilayer perception [8]. The K-Means Clustering [9][10] method is utilized to create transaction-level classes with three levels: low, medium, and high transaction levels [11]. Meanwhile, the Multilayer Perceptron (MLP) [12][13] is employed to determine the transaction level of the double-track student business groups. K-means clustering is one of the popular algorithms in data analysis used to group data into different clusters based on similarities in features or attributes [14][15]. On the other hand, the MLP is one type of structured Artificial Neural Network (ANN) [16] architecture that utilizes supervised learning methods [17], known as backpropagation, for classification purposes [18][19]. The MLP is chosen because it is highly effective, easy to implement, and provides good results in many cases [20][21][22]. The capability of MLP, compared to several other methods such as Support Vector machines (SVM) [23], can yield better results [24][25]. In addition, compared to the Decision Tree and Random Forest methods, MLP can achieve a higher accuracy rate of 80% [25]. Additionally, MLP is better than CNN [26]. Subsequently, compared to the polynomial regression method, MLP shows better performance [27]. Python was chosen as the programming language for this study since it is considered one of the easiest to learn and utilize [28]. A machine learning model developed from this study can execute data target labeling and categorization with the highest precision and accuracy. This model is anticipated to help the East Java Provincial Education Office determine the transaction amounts and streamline the decision- making process for each KUS receiving financial support. II. Method The research methodology is a framework researchers use when conducting a study, encompassing the stages from data collection to data analysis. These stages are carried out in a structured and systematic manner. The research stages are presented in Figure 1. 71 Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 Fig. 1. Research stages The data collection process was obtained from the official website of the SMA Double Track program, www.smadt.id, to be used as testing material for this research. The data obtained consists of 1547 records with 16 feature attributes, including school, district, topic name, topic, income, expenditure, profit, catalog, screenshot, online shop link, Instagram link, product poster, description, chairman's name, chairman's phone number, and chairman's address. Out of these 16 features, only 4 are utilized: topic, income, expenditure, and profit. The dataset is stored in Excel file format to facilitate the calculation process. The next step is data preprocessing, which consists of two processes. Firstly, the data cleaning is performed to handle outliers and missing values. Secondly, the attribute data is normalized using the min-max method with a value range between 0 and 1. The min-max method can be calculated as in (1). 𝑥′ = 𝑥− 𝑥𝑚𝑖𝑛 𝑥𝑚𝑎𝑥− 𝑥𝑚𝑖𝑛 (1) 𝑥 ′ is normalized result value, 𝑥 is actual data value to be normalized, 𝑥𝑚𝑖𝑛 is minimum value of the actual data, and x𝑚𝑎𝑥 is maximum value of the actual data. After completing the data preprocessing, the next step is to perform data clustering using K-means clustering with three clusters: low, medium, and high. K-means clustering is chosen for its advantages, as it can efficiently group large objects, thereby expediting the clustering process. This capability has been demonstrated and proven in several studies such as [29][30][31][32][33]. The pseudocode for the K-means algorithm can be seen in Pseudocode 1. PSEUDOCODE 1: K-Means Clustering Input : D = {d1, d2, ….., dn} // set of data items. K // Number desired cluster Output : A set of k clusters. Step : 1. Arbitrarily choose k dsts-items from D as initial centroids; 2. Repeat Assign each item d1 to the cluster which has the closest centroid; Calculate new mean for each cluster; Until convergence criteria is met. The classification system will use the clustering results as labels or target attributes. After the labeling process, the data is divided into training and testing data. The dataset is randomly split, with 80% as training data and 20% as testing data. Next, the model validation process is conducted to assess the performance of the built model using K-fold cross-validation on the training data. After that, the classification process is performed using the multilayer perceptron method. The multilayer perceptron is chosen for its ease of implementation and good results in various cases. This capability has been demonstrated and proven in several studies [34][35][36]. This test uses 5.2 hidden layers and 300 max_iter to achieve good accuracy values. Next, the model's performance is evaluated using k-fold http://www.smadt.id/ Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 72 cross-validation with five splits. Afterward, the classification model's performance is evaluated using the confusion matrix to obtain precision, recall, and f1-score values. The pseudocode for the MLP algorithm can be seen in Pseudocode 2. PSEUDOCODE 2: MLP Input : The features vector each user Start with random initial weights (i.e. , uniform random in [-5,+5]) Do { For all patterns P { For all output Nodes j { Calculate activation (j) Error_j = Target value_j_for_pattern_p= Activation_j For all input Nodes i to output node j { Delta_weight = learning constant = Error_j * Activation_i Weight = weight * Delta_weight ) } } } Until Error is sufficiently small or "Time_Out" Output : The User ID identification result. III. Result and Discussion The dataset obtained from the SMA Double Track website consists of 1547 records with 16 feature attributes, including school, district, topic name, topic, income, expenditure, profit, catalog, screenshot, online shop link, Instagram link, product poster, description, chairman's name, chairman's phone number, and chairman's address. Of these 16 features, only three are used: income, expenditure, and profit. The dataset contains missing values and outliers, necessitating data cleaning and normalization processes to ensure they do not interfere with the calculation process. After completing the preprocessing process, the next step is the data clustering process using K- means clustering with a total of 1383 data points and three attributes: income, expenditure, and profit. The distribution of the data used in this research based on topic data can be seen in Figure 2. Figure 2 shows the number of data for each topic, where the topic of designing Muslim fashion has 48 data, the topic of fashion design has 95 data, the topic of bridal hijab makeup has 163 data, the topic of hair styling has 17 data, the topic of stage makeup has 63 data, the topic of photography has 60 data, the topic of video editing has 37 data, the topic of graphic design has 245 data, the topic of pastry bakery processing has 340 data, the topic of Indonesian food preparation has 59 data, the topic of snacks and beverages has 167 data, the topic of motorcycle tune-up has 66 data, and the topic of electronic equipment maintenance and repair has 23 data. 73 Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 Fig. 2. Distribution of data by topic From these 1382 data points, they will be clustered into three classes, namely (0) low, (1) medium, and (2) high, with centroid values as shown in the Table 1. The visualization of the clustering results based on the three features used is present in Figure 3. Table 1. Centroid values based on income, spending, and benefits Transaction Class Income Spending Benefits 0 0.0427982 0.02958055 0.03180455 1 0.20932486 0.1558142 0.13110358 2 0.61264435 0.50793811 0.27338189 Fig. 3. Clustering results Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 74 Figure 3 shows the visualization of the clustering results based on the attributes used, namely income, expenditure, and profit. The visualization based on transaction classes is shown in Figure 4. Fig. 4. Visualization based on transaction class Figure 4 illustrates the number of data points in each transaction class, where there are 1180 data points in class 0 (low), 163 data points in class 1 (medium), and 40 data points in class 2 (high). This explanation shows that class 0 ("low") has a higher number of data points than the other transaction classes. Figure 5 shows the comparison of transaction classes for each topic. Fig. 5. Comparison of transaction classes in each topic Figure 5 indicates that class 0 or 'low' transactions are most prominent in topics 9 (Pastry Bakery Processing), 8 (Graphic Design), and 3 (Hijab Bridal Makeup). As for class 1 or 'medium' transactions, they are most abundant in topics 10 (Indonesian Food Making), 9 (Pastry Bakery Processing), and 11 (Snacks and Beverages). On the other hand, class 2 or 'high' transactions are most prevalent in topics 9 (Pastry Bakery Processing), 11 (Snacks and Beverages), and 8 (Graphic Design). 75 Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 The clustering results are used as labels or target attributes in the classification system. These results will be manually divided to create training data and testing data. From the dataset, 80% will be randomly selected as training data, while the remaining 20% will be used as testing data. Next, the data validation process is performed using K-fold cross-validation on the training data, and the results are shown in Table 2. Table 2. K- Fold model validation results Number of CV Scores used in Average 5 Cross Validation Scores 1 0.94 2 0.97 3 0.94 4 0.86 5 0.88 Average CV Score 0.92 After that, the classification process is performed using the MLP. This MLP test uses 5.2 hidden layers and 300 max_iter to achieve good loss results. The loss curve graph is shown in the Figure 6. Fig. 6. Graph of the loss curve Next is the comparison between actual values and the classification prediction results. The comparison results can be seen in Figure 7. Fig. 7. Comparison of actual values and predicted values Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 76 The validation of the multilayer perceptron model for classifying transactions resulted in an accuracy of 0.96. After the classification process, the matrix was tested using a confusion matrix with calculations based on the classification report. The results are shown in Table 3. Table 3. Matrix testing results based on class precision recall f1-score support 0 0.97 1.00 0.99 219 1 0.85 0.85 0.87 39 2 1.00 0.71 0.83 14 accuracy 0.96 277 macro avg 0.96 0.85 0.90 277 weighted avg 0.96 0.96 0.96 277 From Table 3, it can be concluded that the average accuracy value of the f1 score is 0.96. The average is 0.90, and the weighted average is 0.96. These accuracy results indicate that the multilayer perceptron method is highly effective in classifying data for the Double Track student business groups. IV. Conclusion The present study has produced a promising framework that integrates two separate methodologies, enabling the simultaneous execution of clustering and classification tasks. This novel framework has significant use in situations with a dearth of predetermined target data. The model presented in this study holds significant potential for a wide range of applications, primarily aimed at providing valuable assistance to the East Java Provincial Education Office. Its main objective is to acquire insights into the transaction behaviors exhibited by the SMA Double Track student business groups. These observations can provide a basis for formulating policies to provide more money to student-led firms, thus enhancing their entrepreneurial initiatives' quality and long-term viability. This study showcases the impressive accuracy of the k-means clustering and multilayer perceptron algorithms in effectively identifying the transactions of the Double Track student business groups, highlighting their dynamic synergy. The k-means clustering technique was crucial in producing the desired dataset by categorizing transaction levels into three unique classes: (0) representing low transactions, (1) representing medium transactions, and (2) representing high transactions. The clustering procedure took into account three fundamental features, namely: (1) revenue, (2) spending, and (3) profit. The categorization outcomes obtained utilizing the multilayer perceptron exhibited a noteworthy accuracy rate. In order to evaluate the model's overall performance, a comprehensive analysis of training errors was carried out using K-Fold cross-validation. In considering the future trajectory, it is crucial to improve both the K-means clustering and multilayer perceptron models to fully harness their capabilities and advance the effectiveness of these models. Furthermore, it is suggested that the scope of model creation be expanded to encompass comparative analyses utilizing various approaches, will aid in establishing benchmarks that can be used to assess the quality and comprehensiveness of the model. This prospective investigation presents an intriguing undertaking with the potential to revolutionize transaction analysis and policy development for student-led enterprises inside the educational sector. Acknowledgment The author wishes to sincerely thank all individuals and organizations who have contributed valuable contributions to this research endeavor's successful completion. Special recognition is owed to SMA Double Track for their gracious permission to perform the study. 77 Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 Declarations Author contribution All authors contributed equally as the main contributor of this paper. All authors read and approved the final paper. Funding statement This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors. Conflict of interest The authors declare no known conflict of financial interest or personal relationships that could have appeared to influence the work reported in this paper. Additional information Reprints and permission information are available at http://journal2.um.ac.id/index.php/keds. Publisher’s Note: Department of Electrical Engineering and Informatics - Universitas Negeri Malang remains neutral with regard to jurisdictional claims and institutional affiliations. References [1] A. Yulikah, M. A. Faizin, and A. E. Sujianto, "Implementation of Islamic Entrepreneurship Concept in Double Track SMA Program," Indones. Econ. Rev., vol. 1, no. 2, pp. 98–108, 2021. [2] J. Yu, Y. Qiao, N. Shu, K. Sun, S. Zhou, and J. Yang, "Neural Network Based Transaction Classification System for Chinese Transaction Behavior Analysis," Proc. - 2019 IEEE Int. Congr. Big Data, BigData Congr. 2019 - Part 2019 IEEE World Congr. Serv., pp. 64–71, 2019. [3] T. Hu, X. Liu, T. Chen, X. Zhang, and X. Huang, "Transaction-based classification and detection approach for Ethereum smart contract," vol. 58, no. May 2020, 2021. [4] B. Karunachandra, N. Putera, S. R. Wijaya, D. Suryani, J. Wesley, and Y. Purnama, "On the benefits of machine learning classification in cashback fraud detection," Procedia Comput. Sci., vol. 216, no. 2022, pp. 364–369, 2023. [5] R. Saxena, D. Arora, and V. Nagar, "Classifying Transactional Addresses using Supervised Learning Approaches over Ethereum Blockchain," Procedia Comput. Sci., vol. 218, no. 2022, pp. 2018–2025, 2023. [6] R. Sukumaran, "Improved Customer Transaction Classification using Semi-Supervised Knowledge Distillation," 2021. [7] A. Mardanshahi, V. Nasir, S. Kazemirad, and M. M. Shokrieh, "Detection and classification of matrix cracking in laminated composites using guided wave propagation and artificial neural networks," Compos. Struct., vol. 246, no. April, p. 112403, 2020. [8] U. Orhan, M. Hekim, and M. Ozer, "EEG signals classification using the K-means clustering and a multilayer perceptron neural network model," Expert Syst. Appl., vol. 38, no. 10, pp. 13475–13481, 2011. [9] Y. Rong and Y. Liu, "Staged text clustering algorithm based on K-means and hierarchical agglomeration clustering," Proc. 2020 IEEE Int. Conf. Artif. Intell. Comput. Appl. ICAICA 2020, pp. 124–127, 2020. [10] T. Gupta and S. P. Panda, "Clustering Validation of CLARA and K-Means Using Silhouette DUNN Measures on Iris Dataset," Proc. Int. Conf. Mach. Learn. Big Data, Cloud Parallel Comput. Trends, Prespectives Prospect. Com. 2019, pp. 10–13, 2019. [11] P. Sharath Chander, J. Soundarya, and R. Priyadharsini, Brain Tumour Detection and Classification Using K-Means Clustering and SVM Classifier. Springer Singapore, 2020. [12] A. Iqbal and S. Aftab, "A classification framework for software defect prediction using multi-filter feature selection technique and MLP," Int. J. Mod. Educ. Comput. Sci., vol. 12, no. 1, pp. 18–25, 2020. [13] R. Sharma, M. Kim, and A. Gupta, "Motor imagery classification in brain-machine interface with machine learning algorithms: Classical approach to multilayer perceptron model," Biomed. Signal Process. Control, vol. 71, no. PA, p. 103101, 2022. [14] H. Shi and M. Xu, "A Data Classification Method Using Genetic Algorithm and K-Means Algorithm with Optimizing Initial Cluster Center," 2018 IEEE Int. Conf. Comput. Commun. Eng. Technol. CCET 2018, pp. 224–228, 2018. [15] N. Sapkota, A. Alsadoon, P. W. C. Prasad, A. Elchouemi, and A. K. Singh, "Data Summarization Using Clustering and Classification: Spectral Clustering Combined with k-Means Using NFPH," Proc. Int. Conf. Mach. Learn. Big Data, Cloud Parallel Comput. Trends, Prespectives Prospect. Com. 2019, pp. 146–151, 2019. [16] G. Zhou, H. Moayedi, and L. K. Foong, "Teaching–learning-based metaheuristic scheme for modifying neural computing in appraising energy performance of building," Eng. Comput., vol. 37, no. 4, pp. 3037–3048, 2021. [17] S. Brownfield and J. Zhou, "Sentiment Analysis of Amazon Product Reviews," Adv. Intell. Syst. Comput., vol. 1295, no. 1, pp. 739–750, 2020. [18] J. Naskath, G. Sivakamasundari, and A. A. S. Begum, "A Study on Different Deep Learning Algorithms Used in Deep Neural Nets: MLP SOM and DBN," Wirel. Pers. Commun., vol. 128, no. 4, pp. 2913–2936, 2023. [19] M. Y. Chuttur and Y. Parianen, "A Comparison of Machine Learning Models to Prioritise Emails using Emotion Analysis for Customer Service Excellence," Knowl. Eng. Data Sci., vol. 5, no. 1, p. 41, 2022. http://journal2.um.ac.id/index.php/keds https://iconev.org/index.php/ier/article/view/14 https://iconev.org/index.php/ier/article/view/14 https://doi.org/10.1109/BigDataCongress.2019.00021 https://doi.org/10.1109/BigDataCongress.2019.00021 https://doi.org/10.1109/BigDataCongress.2019.00021 https://doi.org/10.1016/j.ipm.2020.102462 https://doi.org/10.1016/j.ipm.2020.102462 https://doi.org/10.1016/j.procs.2022.12.147 https://doi.org/10.1016/j.procs.2022.12.147 https://doi.org/10.1016/j.procs.2023.01.178 https://doi.org/10.1016/j.procs.2023.01.178 http://arxiv.org/abs/2102.07635 http://arxiv.org/abs/2102.07635 https://doi.org/10.1016/j.compstruct.2020.112403 https://doi.org/10.1016/j.compstruct.2020.112403 https://doi.org/10.1016/j.compstruct.2020.112403 https://doi.org/10.1016/j.eswa.2011.04.149 https://doi.org/10.1016/j.eswa.2011.04.149 https://doi.org/10.1109/ICAICA50127.2020.9182394 https://doi.org/10.1109/ICAICA50127.2020.9182394 https://doi.org/10.1109/COMITCon.2019.8862199 https://doi.org/10.1109/COMITCon.2019.8862199 https://doi.org/10.1109/COMITCon.2019.8862199 https://doi.org/10.1007/978-981-13-8323-6_5 https://doi.org/10.1007/978-981-13-8323-6_5 https://doi.org/10.5815/ijmecs.2020.01.03 https://doi.org/10.5815/ijmecs.2020.01.03 https://doi.org/10.1016/j.bspc.2021.103101 https://doi.org/10.1016/j.bspc.2021.103101 https://doi.org/10.1016/j.bspc.2021.103101 https://doi.org/10.1109/CCET.2018.8542173 https://doi.org/10.1109/CCET.2018.8542173 https://doi.org/10.1109/COMITCon.2019.8862218 https://doi.org/10.1109/COMITCon.2019.8862218 https://doi.org/10.1109/COMITCon.2019.8862218 https://doi.org/10.1007/s00366-020-00981-5 https://doi.org/10.1007/s00366-020-00981-5 https://doi.org/10.1007/978-3-030-63319-6_68 https://doi.org/10.1007/978-3-030-63319-6_68 https://doi.org/10.1007/s11277-022-10079-4 https://doi.org/10.1007/s11277-022-10079-4 https://doi.org/10.17977/um018v5i12022p41-52 https://doi.org/10.17977/um018v5i12022p41-52 Walid et al. / Knowledge Engineering and Data Science 2023, 6 (1): 69–78 78 [20] S. Talatian Azad, G. Ahmadi, and A. Rezaeipanah, "An intelligent ensemble classification method based on multilayer perceptron neural network and evolutionary algorithms for breast cancer diagnosis," J. Exp. Theor. Artif. Intell., vol. 34, no. 6, pp. 949–969, 2022. [21] I. Tolstikhin et al., "MLP-Mixer: An all-MLP Architecture for Vision," Adv. Neural Inf. Process. Syst., vol. 29, no. NeurIPS, pp. 24261–24272, 2021. [22] M. Wang, Y. Lu, and J. Qin, "A dynamic MLP-based DDoS attack detection method using feature selection and feedback," Comput. Secur., vol. 88, p. 101645, 2020. [23] N. Salankar, P. Mishra, and L. Garg, "Emotion recognition from EEG signals using empirical mode decomposition and second-order difference plot," Biomed. Signal Process. Control, vol. 65, no. August 2020, p. 102389, 2021. [24] A. Kurani, P. Doshi, A. Vakharia, and M. Shah, "A Comprehensive Comparative Study of Artificial Neural Network (ANN) and Support Vector Machines (SVM) on Stock Forecasting," Ann. Data Sci., vol. 10, no. 1, pp. 183–208, 2023. [25] T. S. Bressan, M. Kehl de Souza, T. J. Girelli, and F. C. Junior, "Evaluation of machine learning methods for lithology classification using geophysical data," Comput. Geosci., vol. 139, p. 104475, 2020. [26] P. Benz, S. Ham, C. Zhang, A. Karjauv, and I. S. Kweon, "Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs," 2021. [27] J. Hwang, J. Lee, and K. S. Lee, "A deep learning-based method for grip strength prediction: Comparison of multilayer perceptron and polynomial regression approaches," PLoS One, vol. 16, no. 2 February, pp. 1–12, 2021. [28] M. B. Tamam, M. Walid, J. Freitas, and A. Bernardo, "Classification of Sign Language in Real Time Using Convolutional Neural Network," vol. 6, no. 1, pp. 39–46, 2023. [29] X. S. Tan, Z. Yang, Y. Benlimane, and E. Liu, "Using Classification with K-means Clustering to Investigate Transaction Anomaly," pp. 171–174, 2020. [30] C. F. Yang, G. J. Liu, and C. G. Yan, “A k-means-based and no-super-parametric Improvement of AdaBoost and its Application to Transaction Fraud Detection,” in 2020 IEEE International Conference on Networking, Sensing and Control (ICNSC), Oct. 2020, pp. 1–5. [31] T. Amarasinghe and N. Krishnarajah, "Critical Analysis of Machine Learning Based Approaches for Fraud Detection in Financial Transactions," pp. 12–17, 2018. [32] A. R. Khan, M. Harouni, and R. Abbasi, "Brain tumor segmentation using K-means clustering and deep learning with synthetic data augmentation for classification," no. February 2020, pp. 1–11, 2021. [33] C. Usha Kumari, S. Jeevan Prasad, and G. Mounika, "Leaf disease detection: Feature extraction with k -means clustering and classification with ANN," Proc. 3rd Int. Conf. Comput. Methodol. Commun. ICCMC 2019, no. Iccmc, pp. 1095–1098, 2019. [34] M. H. Santoso, D. A. Larasati, U. Medan, and A. Sumatera, "Wayang Image Classification Using MLP Method and GLCM Feature Extraction," J. Comput. Sci. Inf. Technol. Telecommun. Eng., vol. 1, no. 2, pp. 111–120, 2020. [35] I. T. Um, J. H. Ra, and M. H. Kim, "Comparison of clustering methods for MLP-based speaker verification," Proc. - Int. Conf. Pattern Recognit., vol. 15, no. 2, pp. 475–478, 2000. [36] S. Fekri-Ershad, "Bark texture classification using improved local ternary patterns and multilayer neural network," Expert Syst. Appl., vol. 158, p. 113509, 2020. https://doi.org/10.1080/0952813X.2021.1938698 https://doi.org/10.1080/0952813X.2021.1938698 https://doi.org/10.1080/0952813X.2021.1938698 https://arxiv.org/abs/2105.01601 https://arxiv.org/abs/2105.01601 https://doi.org/10.1016/j.cose.2019.101645 https://doi.org/10.1016/j.cose.2019.101645 https://doi.org/10.1016/j.bspc.2020.102389 https://doi.org/10.1016/j.bspc.2020.102389 https://doi.org/10.1007/s40745-021-00344-x https://doi.org/10.1007/s40745-021-00344-x https://doi.org/10.1016/j.cageo.2020.104475 https://doi.org/10.1016/j.cageo.2020.104475 http://arxiv.org/abs/2110.02797 http://arxiv.org/abs/2110.02797 https://doi.org/10.1371/journal.pone.0246870 https://doi.org/10.1371/journal.pone.0246870 https://doi.org/10.15408/aism.v6i1.29820 https://doi.org/10.15408/aism.v6i1.29820 https://doi.org/10.1109/IEEM45057.2020.9309909 https://doi.org/10.1109/IEEM45057.2020.9309909 https://doi.org/10.1109/ICNSC48988.2020.9238121 https://doi.org/10.1109/ICNSC48988.2020.9238121 https://doi.org/10.1109/ICNSC48988.2020.9238121 https://doi.org/10.1145/3231884.3231894 https://doi.org/10.1145/3231884.3231894 https://doi.org/10.1002/jemt.23694 https://doi.org/10.1002/jemt.23694 https://doi.org/10.1109/ICCMC.2019.8819750 https://doi.org/10.1109/ICCMC.2019.8819750 https://doi.org/10.1109/ICCMC.2019.8819750 https://doi.org/10.30596/jcositte.v1i2.5131 https://doi.org/10.30596/jcositte.v1i2.5131 https://doi.org/10.1109/icpr.2000.906115 https://doi.org/10.1109/icpr.2000.906115 https://doi.org/10.1016/j.eswa.2020.113509 https://doi.org/10.1016/j.eswa.2020.113509