Search Results - (( a constructive method algorithm ) OR ( process classification based algorithm ))
Search alternatives:
- process classification »
- classification based »
- method algorithm »
- a constructive »
-
1
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Optimized feature construction methods for data summarizations of relational data
Published 2014“…This thesis also presents the study of a method to improve the descriptive accuracy of DARA algorithm by generating multi-instances of summarized data. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
4
Ideal combination feature selection model for classification problem based on bio-inspired approach
Published 2020“…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
Get full text
Get full text
Book Section -
5
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…ECG is a new generation of biometric modality which presents a number of notable problems in signal processing, extraction of significant features from the ECG signals and construction of an accurate subject recognition system. …”
Get full text
Get full text
Thesis -
6
A new soft set based pruning algorithm for ensemble method
Published 2016“…Therefore, this paper aims to increase classification accuracy and at the same time minimizing ensemble classifiers by constructing a new ensemble pruning method (SSPM) based on dimensionality reduction in soft set theory. …”
Get full text
Get full text
Article -
7
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report -
8
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…Comparative analysis of software packages, including Global Mapper and CloudCompare, was conducted based on their processing methods and point cloud accuracy. …”
Get full text
Get full text
Student Project -
9
Optimization of attribute selection model using bio-inspired algorithms
Published 2019“…Such a finding indicates that bio-inspired algorithms can contribute in identifying the few most important features to be used in data mining model construction.…”
Get full text
Get full text
Get full text
Article -
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
Feature clustering for pso-based feature construction on high-dimensional data
Published 2019“…This paper proposes a cluster based PSO feature construction approach called ClusPSOFC. …”
Get full text
Get full text
Get full text
Article -
12
Machine learning for data classification in construction project planning
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
Published 2018“…This inclusive of the investigation of vulnerability classification objectives,processes,classifiers and focus domains among prominent framework.Final step is to construct the framework by establishing the formal presentation of the vulnerability classification algo-rithm.The validation process was conducted empirically using statistical method to assess the accuracy and consistency by using the precision and recall rate of the algorithm on five data sets each with 500 samples.The findings show a significant result with precision's error rate or p value is between 0.01 and 0.02 with error rate for recall's error rate is between 0.02 and 0.04.Another validation was conducted to verify the correctness of the classification by using expert opinions,and the results showed that the ambiguity of several cases were subdue. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article -
16
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article -
17
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…A modified apriori algorithm was employed to reduce the number of clusters effectively on the basis of common data in the clusters of every input to obtain a minimal set of decision rules based on datasets. …”
Get full text
Get full text
Thesis -
18
Pattern generation through feature values modification and decision tree ensemble construction
Published 2013“…A number of methods have been investigated for constructing ensemble in which some of them train classifiers with the generated patterns. …”
Get full text
Get full text
Get full text
Article -
19
Speaker identification through feature fusion based deep learning / Rashid Jahangir
Published 2021“…In addition, DNN obtained better classification results compared with the other five machine learning algorithms that were recently utilised in speaker recognition. …”
Get full text
Get full text
Thesis -
20
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper
