Search Results - (( using function method algorithm ) OR ( based evaluation mining algorithm ))
Search alternatives:
- evaluation mining »
- method algorithm »
- based evaluation »
- mining algorithm »
- function method »
- using function »
-
1
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
2
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
3
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022“…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
Get full text
Get full text
Thesis -
6
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…In the second adaptive method, membership functions tuning, a direct adaptive fuzzy controller is used to modify the locations of the output membership functions, adaptively. …”
Get full text
Get full text
Thesis -
7
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…This paper focuses on a graph-based approach for text representation and presents a novel error tolerance dissimilarity algorithm for deviation detection. …”
Get full text
Get full text
Get full text
Article -
8
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
9
AN AGENT-BASED DOCUMENT CLASSIFICATION MODEL TO IMPROVE THE EFFICIENCY OF THE AUTOMATED SYSTEMATIC REVIEW PROCESS
Published 2023“…Firstly, the document classification algorithm analyses a full text of research articles and evaluates relevancy. …”
Review -
10
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
Get full text
Get full text
Thesis -
11
Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability
Published 2022“…The first phase aims to investigate the best types of required data, features and algorithms to be used in the final proposed methodology to predict exact EDSS, and different ranges of EDSS. …”
Get full text
Get full text
Get full text
Thesis -
12
Improving named entity recognition accuracy of gene and protein in biomedical text
Published 2011“…The proposed approach is evaluated based on two measures: recall and precision which are used to calculate a balanced F-test. We have compared our pattern matching function with the other methods and result is satisfied as precision is 98.5% and recall is 96.4%, while the F-test is 97.5 for both gene and protein names recognizing and precision is 99.3% and recall is 99.1%, while the F-test is 99.1 for protein names recognizing.…”
Get full text
Get full text
Thesis -
13
The implementation of market basket analysis in menu association model for Corm Café / Nur Amalina Kamarulzaman
Published 2018“…To find the frequent item mining, the researcher had proposed some efficient algorithm which is FP-Growth. …”
Get full text
Get full text
Thesis -
14
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
18
Prime-based method for interactive mining of frequent patterns
Published 2010“…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
Get full text
Get full text
Thesis -
19
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
20
IncSPADE: An Incremental Sequential Pattern Mining Algorithm Based on SPADE Property
Published 2016Get full text
Get full text
Get full text
Book Chapter
