Search Results - (( java implementation bat algorithm ) OR ( using table mining algorithm ))
Search alternatives:
- java implementation »
- implementation bat »
- mining algorithm »
- bat algorithm »
- table mining »
- using table »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Mining least relational patterns from multi relational tables
Published 2005“…Results from the implementation reveal that the algorithm is capable of mining rare item in multi relational tables.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Data mining approach to herbs classification
Published 2018Get full text
Get full text
Get full text
Article -
4
Analysis of Feature Selection Methods for Sentiment Analysis Concerning Covid-19 Vaccination Issues
Published 2023“…In this study, the author will continue the research from another researcher by adding a feature selection process, such as two algorithms from the filtered method, chi-square, and information gain, and one algorithm from the wrapped method, which is Genetic Algorithms (GA). …”
Get full text
Get full text
Get full text
Article -
5
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…Therefore, it can be solved by using population-based techniques such as Genetic Algorithm and Particle Swarm Optimization. …”
Get full text
Get full text
Conference or Workshop Item -
6
Evolutionary-based feature construction with substitution for data summarization using DARA
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Classification models for higher learning scholarship award decisions
Published 2018“…In this study, a data mining approach was used to propose a classification model of scholarship award result determination. …”
Get full text
Get full text
Get full text
Article -
8
Protection of the digital holy Quran using SAB hash function
Published 2013Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. …”
Get full text
Get full text
Get full text
Article -
10
Knowledge Discovery Of Noise Level In Lecture Rooms
Published 2018“…Data classification was conducted in two phases; initially on 23 built-in classifier algorithms followed by a refinement of seven better-performed classifiers with selective attributes investigation using Weka tool. …”
Get full text
Get full text
Monograph
