Search Results - (( based constructive method algorithm ) OR ( data application based algorithm ))
Search alternatives:
- based constructive »
- application based »
- method algorithm »
- data application »
-
1
An evolutionary based features construction methods for data summarization approach
Published 2015“…In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
Get full text
Get full text
Research Report -
2
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
3
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
An efficient and effective case classification method based on slicing
Published 2006“…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
Get full text
Get full text
Get full text
Article -
5
-
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Optimized feature construction methods for data summarizations of relational data
Published 2014“…This thesis also presents the study of a method to improve the descriptive accuracy of DARA algorithm by generating multi-instances of summarized data. …”
Get full text
Get full text
Get full text
Thesis -
8
Prime-based method for interactive mining of frequent patterns
Published 2010“…As response to the above-mentioned challenges, this study is devoted towards developing an interactive mining method based on prime number and its special characteristic “uniqueness” by which the content of the relevant data is transformed into a compact layout. …”
Get full text
Get full text
Thesis -
9
Robust Image Zero- Watermarking Based on Complex Zernike Moment
Published 2014“…Zero watermarking algorithm changes the operation method of embedding watermark in the original data. …”
Get full text
Get full text
Conference or Workshop Item -
10
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
Get full text
Get full text
Get full text
Thesis -
11
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
Get full text
Get full text
Thesis -
12
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…The second part of the study is on the confidence intervals (CI) for the concentration parameter in von Mises distribution. Several methods in constructing the CI for the concentration parameter are proposed including CI based on circular population, CI based on the asymptotic distribution of ˆ , CI based on the distribution of 휃 and 푅 and also CI based on bootstrap-t method. …”
Get full text
Get full text
Thesis -
13
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…These methods have been rigorously tested and compared against proprietary heuristic-based software and manual methods. …”
Get full text
Get full text
Get full text
Article -
14
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…Bitwise operations make this algorithm run very fast. The algorithm constructed by the researcher is a modification of Komosko, etc.’s algorithm in 2015 and it is the key result of this research. …”
Get full text
Get full text
Get full text
Article -
15
Clustering of rainfall data using k-means algorithm
Published 2019“…Clustering algorithms in data mining is the method for extracting useful information for a given data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Robust Image Zero-Watermarking Based on Complex Zernike Moment
Published 2014“…Zero watermarking algorithm changes the operation method of embedding watermark in the original data. …”
Get full text
Get full text
Conference or Workshop Item -
17
Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection
Published 2020“…Four state-of-the-art algorithms include particle swarm optimization, flower pollination algorithm, butterfly optimization algorithm, and CBGWO are used to examine the effectiveness of proposed methods in feature selection. …”
Get full text
Get full text
Get full text
Article -
18
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…Gene selection is usually based on univariate or multivariate methods. Univariate methods for gene selection cannot address interactions among multiple genes, a situation which demands the multivariate methods [1], [2]. …”
Get full text
Get full text
Get full text
Article -
19
Optimization of attribute selection model using bio-inspired algorithms
Published 2019“…The aim of this paper is to investigate the use of bio-inspired search algorithms in producing optimal attribute set. This is achieved in two stages; 1) create attribute selection models by combining search method and feature selection algorithms, and 2) determine an optimized attribute set by employing bio-inspired algorithms.Classification performance of the produced attribute set is analyzed based on accuracy and number of selected attributes. …”
Get full text
Get full text
Get full text
Article -
20
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis
