Search Results - (( learning implementation values algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- implementation values »
- application mining »
- values algorithm »
- java application »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Perbandingan penggunaan algoritma Krzyzak dengan algoritma rambatan balik piawai dalam domain peramalan
Published 2004“…The performance is measured based on the accuracies, which is, quantified by root mean square error and learning speed for convergence. The results show that by using a small value of learning rate, Krzyzak algorithm is better than standard back propagation algorithm for medium and long term forecasting.…”
Get full text
Get full text
Article -
9
A machine learning approach to tourism recommendations system
Published 2025“…To overcome this problem, this project implements machine learning algorithms with collaborative filtering, content-based filtering and hybrid filtering approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
An implementation of brain emotional learning based intelligent controller for AVR system
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Perbandingan penggunaan algoritma Krzyzak dengan algoritma rambatan balik piawai dalam domain peramalan
Published 2004“…The performance is measured based on the accuracies, which is, quantified by root mean square error and learning speed for convergence. The results show that by using a small value of learning rate, Krzyzak algorithm is better than standard back propagation algorithm for medium and long term forecasting.…”
Get full text
Get full text
Get full text
Article -
12
An implementation of brain emotional learning based intelligent Controller for AVR system
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Watermarking in safe region of frequency domain using complex-valued neural network
Published 2010“…It has been discovered by computational experiments that Complex Back-Propagation (CBP) algorithm is well suited for learning complex pattern, and it has been reported that this ability can successfully be applied in image processing with complex values. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Decision tree is an important method in data mining to solve the classification problems. There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…In this study, methods of K-Mean Clustering, Euclidean Distance and Cosine Similarity are implemented. These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…In its operation, the metaheuristic algorithm optimizes the feature selection process,which will later be processed using the classification algorithm.Three (3) meta-heuristics were implemented, namely Genetic Algorithm, Particle Swarm Optimization, and Cuckoo Search Algorithm; the experiment was conducted, and the results were collected and analyzed. …”
Get full text
Get full text
Get full text
Article -
17
Development of lung cancer prediction system using meta-heuristic optimized deep learning model
Published 2023“…Finally, the classification is implemented using an ensemble classifier, deep learning instantaneously trained a neural network and an Autoencoder-based Recurrent Neural Network (ARNN) classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…Unlike the classical kNN algorithm which is a regression type algorithm, the proposed localisation algorithms utilise machine learning classification for both linear and kernel types. …”
Get full text
Get full text
Thesis -
19
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
20
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, the developed algorithm is implemented to estimate the parameters of the Lorenz system. …”
Get full text
Get full text
Thesis
