Search Results - (( java application optimization algorithm ) OR ( based identification mining algorithm ))
Search alternatives:
- application optimization »
- identification mining »
- based identification »
- java application »
- mining algorithm »
-
1
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…To aid the aim, a data mining based damage identification approach can be utilized to solve these drawbacks. …”
Get full text
Get full text
Article -
2
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
3
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
4
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
6
Discovering association rules for mining images datasets: a proposal
Published 2005“…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
Get full text
Get full text
Conference or Workshop Item -
7
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…In this paper we will explain the first part of our research, which is focused on outlier identification and provide a description of why an identified outlier exceptional, based on Distance-Based outlier detection and Density-Based outlier detection.…”
Get full text
Get full text
Conference or Workshop Item -
8
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
9
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
10
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
14
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
15
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Density-based clustering with three clusters outperformed the K-Means algorithm with three clusters in terms of accuracy. …”
Get full text
Get full text
Article -
16
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
17
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
18
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…Subsequently, we propose an agent based-text mining model that facilitate the identification of relevant studies in big databases. …”
Article -
19
-
20
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article
