Search Results - (( features solution mining algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- features solution »
- mining algorithm »
- solution mining »
- case algorithm »
-
1
A partition based feature selection approach for mixed data clustering / Ashish Dutt
Published 2020“…In this thesis, a novel weighted feature selection approach on nominal features is proposed, for a partition. clustering algorithm that can handle mixed data. …”
Get full text
Get full text
Get full text
Thesis -
2
Tree-based contrast subspace mining method
Published 2020“…Genetic algorithm has been widely used to find global solution to optimization and search problem. …”
Get full text
Get full text
Get full text
Thesis -
3
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…The major finding of this review is that context-specific text mining algorithms are lacking. The main underlying text-mining challenge that seems to deserve immediate attention is the sparse and high dimensional nature of the feature-space. …”
Get full text
Get full text
Thesis -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…The proposed algorithm is compared with the state-of-the-art feature selection algorithms using three different datasets. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Ideal combination feature selection model for classification problem based on bio-inspired approach
Published 2020“…The important step is to idealize the combined feature selection models by finding the best combination of search method and feature selection algorithms. …”
Get full text
Get full text
Book Section -
8
Towards a better feature subset selection approach
Published 2010“…The selection of the optimal features subset and the classification has become an important issue in the data mining field.We propose a feature selection scheme based on slicing technique which was originally proposed for programming languages.The proposed approach called Case Slicing Technique (CST).Slicing means that we are interested in automatically obtaining that portion 'features' of the case responsible for specific parts of the solution of the case at hand.We show that our goal should be to eliminate the number of features by removing irrelevant once.Choosing a subset of the features may increase accuracy and reduce complexity of the acquired knowledge.Our experimental results indicate that the performance of CST as a method of feature subset selection is better than the performance of the other approaches which are RELIEF with Base Learning Algorithm (C4.5), RELIEF with K-Nearest Neighbour (K-NN), RELIEF with Induction of Decision Tree Algorithm (ID3) and RELIEF with Naïve Bayes (NB), which are mostly used in the feature selection task.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
10
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…Data reduction is an essential task in the data preparation phase of knowledge discovery and data mining (KDD). The reduction method contains two techniques, namely features reduction and data reduction which are commonly applied to a classification problem. …”
Get full text
Get full text
Conference or Workshop Item -
11
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
13
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
14
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
15
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
16
-
17
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
18
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
20
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article
