Search Results - (( developing identification mining algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  2. 2

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  6. 6

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Most methods in the early work that detects outliers independently have been developed in field of Statistics. Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…In this paper, we analyze the literature and identify the text mining factors that influence the identification of relevant studies. …”
    Article
  10. 10

    An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail by Azilawati Azizan, Azilawati Azizan, NurAine Saidin, NurAine Saidin, Nurkhairizan Khairudin, Nurkhairizan Khairudin, Rohana Ismail, Rohana Ismail

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…To achieve this objective, the research was divided into three phases, which consist of talent data identification and data preparation phase, algorithm development for prototype phase and testing and evaluation phase to identify the most suitable prediction model for talent prediction. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Context aware app recommendation using email semantic analysis by Tang, Zi Cong

    Published 2019
    “…The recommendation system is planned to develop by using data mining and machine learning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…The application of the apriori algorithm facilitated the identification of frequent itemsets and rules that reveal patterns across accident variables, such as road conditions, road functions, accident types, weather conditions, and victim statuses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16
  17. 17

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…Clustering includes the identification of subsets of the data that are similar. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Integrated framework with association analysis for gene selection in microarray data classification by Ong, Huey Fang

    Published 2011
    “…Modifications have been made on the existing association algorithm for mining frequent itemsets, where genes in each itemset were sorted according to their discriminative scores rather than according to lexicographic order. …”
    Get full text
    Get full text
    Thesis