Search Results - (( java application mining algorithm ) OR ( terms selection method algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- selection method »
- method algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Aco-based feature selection algorithm for classification
Published 2022“…The experimental results of the EGCACO algorithm on the UCI dataset are superior to other benchmark optimisation algorithms in terms of the number of selected features for 16 out of the 18 UCI datasets (88.89%) and the best in eight (8) (44.47%) of the datasets for classification accuracy. …”
Get full text
Get full text
Thesis -
9
The significant effect of feature selection methods in spam risk assessment using dendritic cell algorithm
Published 2024Subjects:conference output::conference proceedings::conference paper -
10
Opposition-Based Learning Binary Bat Algorithm as Feature Selection Approach in Taguchi's T-Method
Published 2024“…Thus, this study proposed an Opposition-based Learning Binary Bat Algorithm as the feature selection technique in the T-method. …”
Conference Paper -
11
The Significant Effect of Feature Selection Methods in Spam Risk Assessment Using Dendritic Cell Algorithm
Published 2024Subjects:Proceedings Paper -
12
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation
Published 2017“…The existing CC selection algorithms can slightly provide good mobile cellular performance in terms of maximizing the throughput and balancing the load. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Analysis of Feature Selection Methods for Sentiment Analysis Concerning Covid-19 Vaccination Issues
Published 2023“…For this reason, the feature selection method will be used in this study to select features or terms that contribute more to decisions or labels. …”
Get full text
Get full text
Get full text
Article -
15
A new ant based rule extraction algorithm for web classification
Published 2011“…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
16
Evaluation of FCV and FCM clustering algorithms in cluster-based compound selection
Published 2011“…However, little research has been done on overlapping method fuzzy c-means (FCM) and fuzzy c-varieties (FCV) clustering algorithms in compound selection research. …”
Get full text
Get full text
Get full text
Article -
17
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
Published 2018“…In the first stage, we propose an adaptive filter-based feature selection method that is derived from the odd ratio method, used in reducing the dimensionality of feature space. …”
Get full text
Get full text
Thesis -
18
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…The third set affirmed that the enhancement on the proposed algorithm, which made use of indexing method that suits the medoids, could boost the performance to about 9 to 27 times in terms of execution time depending on the complexity of the dataset. …”
Get full text
Get full text
Thesis -
19
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis
