Search Results - (( based constructive method algorithm ) OR ( data classification system algorithm ))
Search alternatives:
- classification system »
- data classification »
- based constructive »
- method algorithm »
- system algorithm »
-
1
An efficient and effective case classification method based on slicing
Published 2006“…The paper also discusses two of common classification algorithms that are used either in data mining or in general AI. …”
Get full text
Get full text
Get full text
Article -
2
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
3
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
4
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…Therefore, our proposed GA-FIS method will first define the membership functions with logical interpretation which is amendable by domain experts to human understanding, and then genetic algorithm serves as an optimization tool to construct the best combination of rules in fuzzy inference system that can achieve higher classification accuracy and gain better interpretability. …”
Article -
5
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…After constructing predictive FDT, Weighted Fuzzy Production Rules (WFPRs) are extracted from predictive FDT, and then more significant WFPR’s are mined by using similarity-based fuzzy reasoning method. …”
Get full text
Get full text
Thesis -
6
A De-noising Scheme for Enhancing Power Quality Problem Classification System Based on Wavelet Transform and Rule-Based Method
Published 2011“…The ability of the Classification system can then be restored. To test the effectiveness of the denoising scheme, the system is tested with noise-added disturbance signals generated by MATLAB programming language and some field data obtained from the PQDIF resource centre. …”
Get full text
Conference or Workshop Item -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
Machine learning for data classification in construction project planning
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…Neuro-fuzzy inference engine and/or system is knowledge based data processing system and can manage the human reasoning course and create decisions based on uncertainty and imprecise situations. …”
Get full text
Get full text
Thesis -
10
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
11
-
12
Generating type 2 trapezoidal fuzzy membership function using genetic tuning
Published 2022“…The approach provides a new method for the construction and tuning process of the IT2MF, based on the FCM outcomes. …”
Get full text
Get full text
Article -
13
Generating type 2 trapezoidal fuzzy membership function using genetic tuning
Published 2022“…The approach provides a new method for the construction and tuning process of the IT2MF, based on the FCM outcomes. …”
Get full text
Get full text
Article -
14
Application of target detection method based on convolutional neural network in sustainable outdoor education
Published 2023“…This exploration innovatively proposes a method based on the convolutional neural network (CNN) to mine the target information in underwater camera data. …”
Get full text
Get full text
Article -
15
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
18
Dengue classification system using clonal selection algorithm / Karimah Mohd
Published 2012“…This project focused on three main objectives: to investigate dengue data and Clonal Selection Algorithm for classification of Dengue, to design and develops Clonal Selection Classification System (CSCS) and to evaluate Clonal Selection Classification System symptoms. …”
Get full text
Get full text
Thesis -
19
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
20
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…However, further study is needed in the feature extraction and clustering algorithms part as the performance of the pattern classification is still depending on the data input.…”
Get full text
Get full text
Thesis
