Search Results - (( java implication based algorithm ) OR ( using mode ((using algorithm) OR (mining algorithm)) ))
Search alternatives:
- implication based »
- java implication »
- mining algorithm »
- using algorithm »
- using mode »
-
1
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
Get full text
Get full text
Thesis -
3
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
4
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
Get full text
Get full text
Article -
5
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Adding the uncertain class the best accuracy obtained was 98.5% using the SMO algorithm. A predictive classification model that determines the accuracy for three classification classes was developed accordingly using the SMO algorithm.…”
Get full text
Get full text
Monograph -
6
A novel association rule mining approach using TID intermediate itemset
Published 2018Get full text
Get full text
Article -
7
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…Classification analysis was initially performed on all seven classifier’s algorithms at 10-fold dross validation mode. At phase one, Stroke and Curve are added into the dataset and classified respectively. …”
Get full text
Get full text
Monograph -
8
-
9
-
10
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
11
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…The SVM is a one technique of machine learning techniques that is well known technique, learning with supervised and have been applied perfectly to a vary problems of: regression, classification, and clustering in diverse domains such as gene expression, web text mining. In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
Get full text
Get full text
Get full text
Article -
12
Fuzzy Soft Set Clustering for Categorical Data
Published 2024“…Conventional clustering, such as k-means, cannot be openly used to categorical data. Numerous categorical data using clustering algorithms, for instance, fuzzy k-modes and their enhancements, have been developed to overcome this issue. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A Predictive Classification Model For Running Injury
Published 2022“…The J48, SMO, Random Forest, and Simple Logistic algorithms were used for 10-fold cross validation mode classification benchmarked on the ZeroR baseline algorithm. …”
Get full text
Get full text
Monograph -
14
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
15
Enhancement of new smooth support vector machines for classification problems
Published 2011“…In this research, an alternative algorithm, k-mode RSVM (KMo-RSVM) that combines RSVM and k-mode clustering technique to handle classification problems on categorical large dataset and k-prototype RSVM (KPro-RSVM) which combine k-prototype and RSVM to classify large dataset with mixed attributes were proposed. …”
Get full text
Get full text
Thesis -
16
A parallel XTS encryption mode of operation
Published 2009“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
17
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
18
Power prediction mode technique for Hill Climbing Search algorithm to reach the maximum power point tracking
Published 2021“…The proposed algorithm used two main techniques; the first one is power prediction mode and the second one is the two-mode HCS algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Implementation of a parallel XTS encryption mode of operation
Published 2014“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
20
Position control of robot manipulator: Design a novel SISO adaptive sliding mode fuzzy PD fuzzy sliding mode control.
Published 2011“…Compare and evaluate proposed method and sliding mode algorithms under disturbance. In regards to the former, we will be looking at the availability of online tuning methodology and the number of fuzzy if-then rules inherent to the fuzzy system being used and the corresponding computational load. …”
Get full text
Get full text
Article
