Search Results - (( based identification mining algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- identification mining »
- based identification »
- mining algorithm »
- method algorithm »
-
1
Tree-based contrast subspace mining method
Published 2020“…Hence, this thesis presents the optimization of parameters values for the tree-based method by genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…The data vectors are assigned to the closest cluster and correspondingly to the set, which contains this cluster and an algorithm based on a derivative-free method is applied to the solution of this problem. …”
Get full text
Get full text
Thesis -
3
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…To aid the aim, a data mining based damage identification approach can be utilized to solve these drawbacks. …”
Get full text
Get full text
Article -
4
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
5
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
6
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
8
Discovering association rules for mining images datasets: a proposal
Published 2005“…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
Get full text
Get full text
Conference or Workshop Item -
9
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…In this paper we will explain the first part of our research, which is focused on outlier identification and provide a description of why an identified outlier exceptional, based on Distance-Based outlier detection and Density-Based outlier detection.…”
Get full text
Get full text
Conference or Workshop Item -
10
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
12
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
13
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
14
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Density-based clustering with three clusters outperformed the K-Means algorithm with three clusters in terms of accuracy. …”
Get full text
Get full text
Article -
15
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
16
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…Subsequently, we propose an agent based-text mining model that facilitate the identification of relevant studies in big databases. …”
Article -
17
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
18
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
19
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
20
Data mining approach to herbs classification
Published 2018Get full text
Get full text
Get full text
Article
