Search Results - (( intelligence valid tree algorithm ) OR ( intelligence based new algorithm ))
Search alternatives:
- intelligence valid »
- intelligence based »
- tree algorithm »
- new algorithm »
- based new »
-
1
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
2
-
3
A comparative study of supervised machine learning approaches for slope failure production
Published 2023“…Over the years, machine learning, which is a well-known method in artificial intelligent (AI) field has become a new trend and extensively applied in various applications to solve a realworld problem. …”
Conference Paper -
4
-
5
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
6
-
7
A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation
Published 2023“…Grid search cross validation (CV) is applied for hyperparameter tuning of the algorithms. …”
Get full text
Get full text
Get full text
Article -
8
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…Finally, the proposed algorithms were also validated on another dataset of a university campus in a different region. …”
Get full text
Get full text
Thesis -
9
-
10
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016“…In this paper, a new branch of computational intelligence named estimation-based metaheuristic is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
11
Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree
Published 2010“…These rules would then be compared with and validated by benchmarking decision-tree-based data-mining analysis.…”
Get full text
Get full text
Get full text
Article -
12
-
13
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…A new case is retained in the case base for future retrievals. …”
Conference paper -
14
Application of sampling-based motion planning algorithms in autonomous vehicle navigation
Published 2016“…The performance of the proposed method is tested through simulation in different scenarios and also by comparing the performances of RRT and RRT* algorithms. The proposed method provides near-optimal solutions with smaller trees and in lower running time.…”
Get full text
Get full text
Get full text
Book Section -
15
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
16
Developing an intelligent system to acquire meeting knowledge in problem-based learning environments
Published 2006“…MALESAbrain1-3 is an intelligent algorithm which originally is designed for problem-based learning (PBL) environment. …”
Get full text
Get full text
Get full text
Article -
17
African Buffalo Optimization (ABO): A New Metaheuristic Algorithm
Published 2015“…This paper proposes a new meta-heuristic approach to solving numerical and graph-based problems. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
20
