Search Results - (( java implementation bees algorithm ) OR ( using sharing mining algorithm ))
Search alternatives:
- java implementation »
- implementation bees »
- mining algorithm »
- bees algorithm »
- sharing mining »
- using sharing »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…The proposed algorithm is compared with the state-of-the-art feature selection algorithms using three different datasets. …”
Get full text
Get full text
Get full text
Thesis -
3
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Also the algorithm using segmentation strategy is using frontier base algorithm for exploring divided area. …”
Get full text
Get full text
Get full text
Article -
4
Data mining and analysis for predicting electrical energy consumption
Published 2024“…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
Article -
5
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009“…Name Entity Recognition (NER) is one of the main task needed to develop text mining systems in which it is used to identify and classify entities in the text into predefined categories such as the names of persons, organizations, locations, dates, times, quantities, monetary values, percentages, etc. …”
Get full text
Get full text
Conference or Workshop Item -
6
Sentiment Analysis of Cyberbullying in Social Media Using Decision Trees
Published 2020“…This has also risen the possibilities and advancement of security threats. This study uses data mining techniques from the views of users written ion Twitter to use in sentiment analysis of decision tree classification. …”
Get full text
Get full text
Final Year Project -
7
Application of terrain analysis to the mapping and spatial pattern analysis of subsurface geological fractures of Kuala Lumpur limestone bedrock, Malaysia.
Published 2012“…Spatial correlation shows that the Malaysian peninsula, surface and subsurface geological fractures and the geometry of ex-opencast mining ponds share similar trends. The results obtained using this methodology is compared to those of subsurface geological fractures reported by means of geophysical surveying and field investigation. …”
Get full text
Get full text
Article -
8
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…In machine learning, there are three type of learning branch that can used in classification procedures for data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
Get full text
Get full text
Get full text
Article -
10
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
11
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
Get full text
Get full text
Get full text
Thesis -
13
Blockchain-enabled cybersecurity framework for healthcare domain
Published 2025“…In recent years, health data transactions have usually been done in a traditional way, such as centralised data transactions where an intermediary or third-party server is used. Consequently, daily health data transactions carry the risk of privacy leaks and make data sharing and storage space capability difficulties. …”
Get full text
Get full text
Thesis -
14
Multitasking deep neural network models for Arabic dialect sentiment analysis
Published 2022“…Most of the applied approaches are based on single task learning (STL) using machine learning algorithms, such as Logistic Regression (LR) and Hierarchical Classifier (HC) based on the divide-and-conquer approach. …”
Get full text
Get full text
Thesis
