Search Results - (( future solution mining algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- mining algorithm »
- java application »
- future solution »
- solution mining »
-
1
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
2
-
3
Optimizing OLAP heterogeneous computing based on Rabin-Karp algorithm
Published 2013“…In the light of our results; we present the achieved gain and possible future trends. Keywords— OLAP, heterogeneous computing, Rabin-Karp, data mining, pattern recognition.…”
Get full text
Get full text
Get full text
Proceeding Paper -
4
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009Get full text
Get full text
Conference or Workshop Item -
5
A comparative analysis of software engineering approaches for sequence analysis
Published 2013“…The sequences contain the precious information that needs to be mined for useful purposes. There is high concentration required to model the optimal solution. …”
Get full text
Get full text
Book -
6
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
8
Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour
Published 2022“…An absolute majority of base algorithms for this problem were nature-inspired and population-based metaheuristics extended to complementary methods in hybrid solutions. …”
Get full text
Get full text
Get full text
Thesis -
9
Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks
Published 2023“…This new development of the Hopfield network with the 3-Satisfiability logic presents a viable strategy for logic mining applications in future.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Classification models for higher learning scholarship award decisions
Published 2018“…In this study, a data mining approach was used to propose a classification model of scholarship award result determination. …”
Get full text
Get full text
Get full text
Article -
13
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
14
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
Get full text
Get full text
Get full text
Thesis -
15
Web page design for electronic commerce / Lee Fong Wai
Published 2003“…The final part covers the problems encountered during system development process, the solutions taken, system evaluation by end users, the strength and limitation of the system, future enhancement of the system, knowledge and experience gained and conclusion towards the project. …”
Get full text
Get full text
Thesis -
16
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The article ends with a discussion on open issues for research and future directions.…”
Get full text
Get full text
Get full text
Article -
17
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The article ends with a discussion on open issues for research and future directions.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis
