Search Results - (( mining classification system algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- mining classification »
- classification system »
- system algorithm »
- method algorithm »
-
1
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
Published 2015“…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
3
Logistic regression methods for classification of imbalanced data sets
Published 2012“…These results can be seen as further explanation on the success of Truncated Newton method in TR-KLR and TR Iteratively Re-weighted Least Square (TR-IRLS) algorithm respectively, because of the equivalence of iterative method used by these algorithms. …”
Get full text
Get full text
Thesis -
4
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016“…The aim of this article attempts to study the potential of this method in text classification for sentiment analysis.This study consists of three phases; data preparation; classification model development using three selected Immune System based algorithms i.e. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System
Published 2021“…Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
7
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
9
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
10
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
11
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
12
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
13
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
14
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
15
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
16
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
17
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
18
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
19
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
Get full text
Get full text
Research Reports -
20
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper
