Search Results - (( developing supervised mining algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- developing supervised »
- java implementation »
- implementation some »
- supervised mining »
- mining algorithm »
- some algorithm »
-
1
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…An efficient iterative algorithm is developed to optimize the objective function of the proposed algorithm since it is non-smooth and difficult to solve. …”
Get full text
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction
Published 2024“…Therefore, a fuzzy model based on machine learning and data mining is a vital solution. In this study, ten supervised machine learning algorithms namely the J48, Logistic, NaiveBayes Updateable, RandomTree, BayesNet, AdaBoostM1, Random Forest, Multilayer Perceptron, Bagging and Stacking are applied for a simulated diabetes fuzzy dataset, verified by medical experts. …”
Get full text
Get full text
Get full text
Article -
5
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009Get full text
Get full text
Conference or Workshop Item -
6
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. …”
Get full text
Get full text
Article -
8
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
11
Classification of cervical cancer using random forest
Published 2022“…Model evaluation has been conducted to identify the robust data mining algorithm in the prediction of cervical cancer risk. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
13
Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing
Published 2015“…In this research, to eliminate the manual developments of the rule-sets, the supervised DM technique was used to identify the appropriate selection of attributes for object-based classification. …”
Get full text
Get full text
Thesis -
14
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
16
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
18
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The leakage fault cases verify the algorithm�s applicability and complete the correlation diagnosis of water wall leakage fault. …”
Article -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
20
An early warning system for students at risk using supervised machine learning
Published 2024“…For that, this study will perform a study of the current issues, factors, and solutions in education student’s data, determine the supervised machine learning algorithms, compare which model is the best predict the students’ performances, develop an early warning system for the educators to make an early decision in order to assist and consult the at-risk students, and finally conduct testing and evaluation of the system. …”
Get full text
Get full text
Get full text
Article
