Search Results - (( mode selection mining algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- selection mining »
- mining algorithm »
- java application »
- mode selection »
-
1
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…Five independent parameters(gender, race, hometown, family income, university entry mode) have been selected to conduct this study. These parameters are chosen based on prior research studies including from social sciences domains. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…An improved version of Salp Swarm Algorithm (ISSA) is proposed in this study to solve feature selection problems and select the optimal subset of features in wrapper-mode. …”
Get full text
Get full text
Article -
3
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…For the overall performances which were based on the six data sets, the &-AMH algorithm recorded the highest mean accuracy scores of 0.93 as compared to the other algorithms: the ^-Population (0.91), the &-Modes-RVF (0.81), the New Fuzzy &-Modes (0.80), A:-Modes (0.76), &-Modes-HI (0.76), £-Modes- HII (0.75), Fuzzy £-Modes (0.74) and £-Modes-UAVM (0.70). …”
Get full text
Get full text
Thesis -
4
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…The top three classification algorithms were selected: IBk, LMT and Random Committee for further classification. …”
Get full text
Get full text
Monograph -
5
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhancement of new smooth support vector machines for classification problems
Published 2011“…In this research, an alternative algorithm, k-mode RSVM (KMo-RSVM) that combines RSVM and k-mode clustering technique to handle classification problems on categorical large dataset and k-prototype RSVM (KPro-RSVM) which combine k-prototype and RSVM to classify large dataset with mixed attributes were proposed. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
