Search Results - (( problem applications mining algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- problem applications »
- applications mining »
- mining algorithm »
- method algorithm »
-
1
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
Get full text
Get full text
Thesis -
2
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Keeping in view the drawbacks of gradients based learning of ANFIS using gradient descent and least square methods in two-pass learning algorithm, many have trained ANFIS using metaheuristic algorithms. …”
Get full text
Get full text
Article -
3
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
Published 2015“…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Logistic regression methods for classification of imbalanced data sets
Published 2012“…Hence, it is required to develop effective imbalanced LR-based methods to be widely used in data mining applications. …”
Get full text
Get full text
Thesis -
6
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…In this study we show how to apply a particular class of optimization methods known as pattern search methods to address these challenges. …”
Get full text
Get full text
Thesis -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
8
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Weka, a data mining tool, provides the facility to classify the data set with different machine learning algorithms. Six machine learning algorithms were applied and compared based on the classification evaluation methods. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
Published 2018“…In this study, a new method for solving the TD clustering problem worked in the following two stages: (i) A new feature selection method using particle swarm optimization algorithm with a novel weighting scheme and a detailed dimension reduction technique are proposed to obtain a new subset of more informative features with low-dimensional space.…”
Get full text
Get full text
Thesis -
10
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…Therefore, it can be solved by using population-based techniques such as Genetic Algorithm and Particle Swarm Optimization. …”
Get full text
Get full text
Conference or Workshop Item -
11
Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem
Published 2022“…Multidimensional Knapsack Problem (MKP) has been widely used to model real-life combinatorial problems. …”
Get full text
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Clustering of rainfall data using k-means algorithm
Published 2019“…Clustering algorithms in data mining is the method for extracting useful information for a given data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A direct ensemble classifier for imbalanced multiclass learning
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
16
Modeling forest fires risk using spatial decision tree
Published 2011Get full text
Get full text
Conference or Workshop Item -
17
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
18
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
19
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
20
