Search Results - (( evolution identification learning algorithm ) OR ( program implementation mining algorithm ))
Search alternatives:
- evolution identification »
- identification learning »
- program implementation »
- implementation mining »
- learning algorithm »
- mining algorithm »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…Machine learning is an implementation of artificial intelligence (Al) that allows systems to learn and build on knowledge without being directly programmed automatically. …”
Get full text
Get full text
Thesis -
3
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
4
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
5
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
6
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…The other 40% of the dataset is used to test generated rules. A simple program of C++ is implemented using Microsoft Visual Studio to test generated rules until accuracy of performance is obtained. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…In this research, a hand-written character recognition model are implemented in C++ programming with ability to classify digits 0, 1, 2, and 3. …”
Get full text
Get full text
Thesis -
9
-
10
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
11
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…In the experiment, we conducted an evaluation of the effectiveness and efficiency of four nature-inspired binary algorithms for optimization namely Binary Particle Swarm Optimization (BPSO), Binary Grey Wolf Optimization algorithm (BGWO), Binary Differential Evolution algorithm (BDE), and Binary Salp Swarm algorithm (BSS) - in the context of human activity recognition (HAR). …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
Get full text
Get full text
Get full text
Article -
13
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…The objective was to identify and implement the most accurate algorithm for the KPTM dataset and to come up with a good prediction model using decision tree technique. …”
Get full text
Get full text
Conference or Workshop Item -
14
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…Two models, Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) to represent the minimal reduct computation problem were proposed. …”
Get full text
Get full text
Thesis -
15
-
16
The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop
Published 2014“…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
Get full text
Get full text
Get full text
Article -
17
Web page design for electronic commerce / Lee Fong Wai
Published 2003“…The sixth part covers the system implementation that involved the transformation of modules and algorithm into implementable commands by using the specified programming languages. …”
Get full text
Get full text
Thesis -
18
Problem restructuring in interger programming for reduct searching
Published 2003“…They can describe the whole information system when implementing discernment. In effect, they are very useful in generating rules when solving the classification problem that is inherent in data mining. …”
Get full text
Get full text
Thesis -
19
-
20
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis
