Search Results - (( using composition mining algorithm ) OR ( basic evaluation mining algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…Secondly, this report will review the literature part which started with basic knowledge of data mining and knowing what the basic information about data mining. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak by Rajogoval, Illayakantthan

    Published 2022
    “…All the classification accuracies obtained were above the baseline accuracy. The COVID-19 Basic Reproduction Number, R0 a predictive model is developed using a linear regression classification algorithm to predict the COVID-19 Basic Reproduction Number, Robased on the actual COVID-19 Basic Reproduction Number, R0. …”
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4
  5. 5

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…Web spam detection is one of research fields of data mining. With regard to increasing available information in virtual space and the need of users to search, the role of search engines and used algorithms are important in terms of ranking. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining by H’ng, Choo Wooi

    Published 2019
    “…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
    Get full text
    Get full text
    Thesis
  8. 8

    A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition by Ayu, Media Anugerah, Ismail, Siti Aisyah, Abdul Matin, Ahmad Faridi, Mantoro, Teddy

    Published 2012
    “…As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Feature-based approach and sequential pattern mining to enhance quality of Indonesian automatic text summarization by Maylawati, Dian Sa’adillah, Jaya Kumar, Yogan, Kasmin, Fauziah

    Published 2023
    “…This research uses sequential pattern mining (SPM) to produce This research use SPM to produce sequence of words (SoW) as structured text representation using PrefixSpan algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The classical benchmark problems and composite benchmark functions from Congress on Evolutionary Computation (CEC) 2005 special session is used for validate SDAA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system by Ahmad Zainaddin, Dahlia Asyiqin, Mohd Hanapi, Zurina

    Published 2013
    “…In recent years, data mining approach for intrusion detection have been advised and used. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15