Search Results - (( evolution machine learning algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- learning algorithm »
- mining algorithm »
- evolution »
- machine »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
6
-
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Improved whale optimization algorithm for feature selection in Arabic sentiment analysis
Published 2019“…In SA, feature selection phase is an important phase for machine learning classifiers specifically when the datasets used in training is huge. …”
Get full text
Get full text
Article -
10
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Machine learning modeling for radiofrequency electromagnetic fields (RF-EMF) signals from mmWave 5G signals
Published 2023“…Each model contains three machine learning techniques to forecast RF-EMF values: Approximate-RBFNN, Exact-RBFNN, and GRNN. …”
Get full text
Get full text
Article -
12
Modeling 2D appearance evolution for 3D object categorization
Published 2016“…We pose the problem of categorizing 3D polygon meshes as learning appearance evolution from multi-view 2D images. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Ultra-short-term PV power forecasting based on a support vector machine with improved dragonfly algorithm
Published 2021“…Previously, Theexecution can be done by dragonfly algorithm (DA) through adaptive learning factor along with the differential evolution technique. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Chronic kidney disease diagnostic tools based on machine learning algorithms: a review / Muhamad Huzaimi Abdul Ghafar ... [et al.]
Published 2025“…This paper aims to explore the potential of Artificial Intelligence (AI) tools, specifically machine learning (ML), in revolutionizing CKD diagnosis. …”
Get full text
Get full text
Get full text
Article -
15
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…In comparison with V-Detectors, cuckoo search, differential evolution, support vector machine, artificial neural network, na¨ıve bayes, and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms other algorithms with an average detection rate of 95:30% on all the datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Time series predictive analysis based on hybridization of meta-heuristic algorithms
Published 2018“…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
Get full text
Get full text
Article -
17
Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review
Published 2023“…Emphasizing the need for adaptable, terrain-aware control algorithms, the review explores the untapped potential of machine learning and soft robotics in enhancing performance across diverse operational scenarios. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
20
A New Co-Evolution Binary Particle Swarm Optimization With Multiple Inertia Weight Strategy For Feature Selection
Published 2019“…The proposed method is validated with ten benchmark datasets from UCI machine learning repository. To examine the effectiveness of proposed method, four recent and popular feature selection methods namely BPSO, genetic algorithm (GA), binary gravitational search algorithm (BGSA) and competitive binary grey wolf optimizer (CBGWO) are used in a performance comparison. …”
Get full text
Get full text
Get full text
Article
