Search Results - (( evolution evaluation techniques ) OR ( evolution mining techniques ))

Refine Results
  1. 1

    A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution by Abdulrazak Yahya, Saleh, Haza Nuzly, Abdull Hamed, Siti Mariyam, Shamsuddin, Ashraf, Osman Ibrahim

    Published 2018
    “…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers by Azmi M.S.M., Sulaiman M.N.

    Published 2023
    “…To evaluate the proposed voting technique, the performance of selected individual classifiers and existing voting technique was first examined, followed by the experiment to determine the performance of the proposed model. …”
    Article
  3. 3

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…For that purpose, we use data mining techniques. Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Erosion corrosion and tribological behavior of TIG torch composite layers by Maleque, Md. Abdul

    Published 2016
    “…Among the coating techniques, tungsten inert gas (TIG) torch melting technique is currently gaining wide acceptance in surface coating of engineering part component for tribological use. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee by Hiromi , Wong, Siew , Lan, Valery, Fred Lee

    Published 2004
    “…This evolution provokes the emergence of data mining tools, which perform data analysis and extract data patterns. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Global Trends of Educational Data Mining in Online Learning by Chen, Chwen Jen, Teh, Chee Siong, Dexter Sigan, John

    Published 2023
    “…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Many statistical and data mining techniques have been used to predict time series stock market. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. The evolution of authoritative immunofingerprint mining technology is exerting a growing influence on comprehensive cancer diagnosis biology. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Global trends of educational data mining in online learning by Nie Hui Ling, Chwen Jen Chen, Chee Siong Teh, Dexter Sigan John, Looi Chin Ch’ng, Yoon Fah Lay

    Published 2023
    “…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    On fractional and semi-soft handover in long term evolution(LTE) networks by Hussein, Yaseein Soubhi, Mohd Ali, Borhanuddin, Varahram, Pooria

    Published 2011
    “…In this paper a hybrid HO algorithms called semi-soft handover (SSHO) and fractional soft handover (FSHO) in long term evolution (LTE) system are studied. The outage probability, the main metric to evaluate handover, is compared for different handover techniques.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Dynamic risk analysis on process safety: a review of the evolution, approach, and advantages in the industry / Nurul Hazira Zizemurikan by Zizemurikan, Nurul Hazira

    Published 2022
    “…Dynamic risk assessment is a scientific technique for identifying hazards, evaluating risk, and appraising the working environment. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization by Wahab, Muhammad Hafizul Hazmi, Abdul Hamid, Nor Asilah Wati, Subramaniam, Shamala, Latip, Rohaya, Othman, Mohamed

    Published 2024
    “…Through experimentation on Document Understanding Conferences (DUC) datasets, the novel approach of MODE/D – WS is validated by evaluating the results using ROUGE metrics. The outcomes are twofold: a remarkable reduction in serial execution time and a noteworthy enhancement over existing techniques in the scholarly domain, as evidenced by improved ROUGE-1, ROUGE-2, and ROUGE-L scores.…”
    Get full text
    Get full text
    Article
  16. 16

    Two level Differential Evolution algorithms for ARMA parameters estimatio by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Aibinu, Abiodun Musa

    Published 2013
    “…The performance of the algorithm is evaluated using both simulated ARMA models and practical rotary motion system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Suspicious online car advertisement detector using principle component analysis (PCA) / Fathiah Husna Firdaus by Firdaus, Fathiah Husna

    Published 2019
    “…Hence, this study is to propose suspicious advertisement detector by using data mining technique which is Principal Component Analysis (PCA). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Performance analysis of coordinated multipoint (CoMP) in long term evolution-advanced by Liew, Jiun Terng, Hashim, Fazirulhisyam

    Published 2014
    “…Coordinated Multipoint (CoMP) is a new technique introduced in Long Term Evolution-Advanced (LTE-A) to address the inter-cell interference especially the one experienced by cell-edge user. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…The median convergence traces have been compared with two different algorithms based on differential evolution, i:e: Ensemble of Constraint Handling Techniques (ECHT) and Stochastic Ranking Differential Evolution (SRDE). …”
    Get full text
    Get full text
    Article
  20. 20