Search Results - (( java implication based algorithm ) OR ( model estimation mining algorithm ))

Refine Results
  1. 1

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Estimating 1-MCP application for Kampuchea guava with data mining technology by Ding, Phebe, Khor, Kor Chin

    Published 2018
    “…The classification models can then be used for estimating the 1-MCP application fast whenever there are new data available. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An application of IPA approach on the optimization of a mining port stockyard system by Ayu, Media Anugerah, Cardew-Hall, Michael

    Published 2002
    “…The results show that PARMSR algorithm applying IPA can be used to estimate the optimal cost function in subsystem 1 with a high level of confidence. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Datasets Size: Effect on Clustering Results by Raheem, Ajiboye Adeleke, Ruzaini, Abdullah Arshah, Hongwu, Qin

    Published 2013
    “…In this paper, we proposed a research technique that implements descriptive algorithms on numeric datasets of varied sizes. We modeled each subset of our data using EM clustering algorithm; two different numbers of partitions (k) were estimated and used for each experiment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…This merit is provided by balancing the exploitation of solution structure and exploration of its appropriate weighting factors through use of a robust and efficient optimization algorithm in learning process of GEP approach. To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak by Rajogoval, Illayakantthan

    Published 2022
    “…Existing studies applied different models including SIR, SIRD, SEIR, SPIR, MCMC, Statistical exponential growth, statistical likelihood estimation and dynamic transmission models to evaluate COVID-19 R0. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11
  12. 12

    Prediction of Temerloh River water level for prediction of flood using Artificial Neural Network (ANN) method by Muhamad Afiq, Mustafa

    Published 2015
    “…ANN model will be use to estimate river water level by taking present river water level data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…This study present improved model for subspace clustering based on density connection, to cope with the challenges clustering in educational data mining, named as DAMIRA. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…This study present improved model for subspace clustering based on density connection, to cope with the challenges clustering in educational data mining, named as DAMIRA. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The BayesNet provides the best integrated MLADR fault classifier model better at a 5 % significance level than other deployed algorithms in the intelligent supervised learning model realization. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…To enhance the selection of most highly ranking features, irrelevant features are ‘pruned’ based on determined boundary threshold. In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Prediction of breast cancer relapse time in continuous scale based on type-2 TSK fuzzy model by Mahmoudian, Sayed Hamid

    Published 2010
    “…In addition, K-fold Cross Validation, B632 and B632+ methods have been used for error estimation. In the first objective of the thesis, a lemma has been proven and a new hybrid algorithm based on Fuzzy Association Rule Mining has been proposed to gather some selected genes and generate fuzzy rules for classification. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article