Search Results - (( developing identification mining algorithm ) OR ( java application during algorithm ))
Search alternatives:
- developing identification »
- identification mining »
- application during »
- mining algorithm »
- java application »
- during algorithm »
-
1
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
2
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
3
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
Get full text
Get full text
Get full text
Thesis -
4
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
5
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
6
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Most methods in the early work that detects outliers independently have been developed in field of Statistics. Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
7
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
8
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
9
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In this paper, we analyze the literature and identify the text mining factors that influence the identification of relevant studies. …”
Article -
10
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
11
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…To achieve this objective, the research was divided into three phases, which consist of talent data identification and data preparation phase, algorithm development for prototype phase and testing and evaluation phase to identify the most suitable prediction model for talent prediction. …”
Get full text
Get full text
Research Reports -
12
Context aware app recommendation using email semantic analysis
Published 2019“…The recommendation system is planned to develop by using data mining and machine learning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…The application of the apriori algorithm facilitated the identification of frequent itemsets and rules that reveal patterns across accident variables, such as road conditions, road functions, accident types, weather conditions, and victim statuses. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
15
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
16
-
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Clustering includes the identification of subsets of the data that are similar. …”
Get full text
Get full text
Thesis -
19
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
Get full text
Get full text
Get full text
Thesis -
20
Integrated framework with association analysis for gene selection in microarray data classification
Published 2011“…Modifications have been made on the existing association algorithm for mining frequent itemsets, where genes in each itemset were sorted according to their discriminative scores rather than according to lexicographic order. …”
Get full text
Get full text
Thesis
