Search Results - (( using lean optimization algorithm ) OR ( basic visualization mining algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2

    Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng by Cheong, Dianne L.M., Sia Abdullah, Nur Atiqah

    Published 2006
    “…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure by Asmai, S. A.

    Published 2014
    “…This project proposed a data mining technique called Association Rule Mining. Basically Association Rule Mining is to investigate the rules according to the predefined parameter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of a systematic method in lean tool selection for automotive industry by Anvari, Alireza

    Published 2012
    “…The developed software probably assists manufacturers in applying the systematic lean tool selection. Based on the systematic features of this algorithm, the efficiency and effectiveness of the model in presenting optimizing techniques for lean tool selection with the automotive industry seems reasonable and useful. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Hierarchical gaussian reinforcement learning for path planning in uncertain environments by AlDahoul, Nouar, Htike@Muhammad Yusof, Zaw Zaw, Akmeliawati, Rini, Shafie, Amir Akramin

    Published 2015
    “…We propose a path planning algorithm for robots in uncertain environments by using hierarchical Gaussian Q-learning. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  10. 10

    The enhanced BPNN-NAR and BPNN-NARMA models for Malaysian aggregate cost indices with outlying data by Ahmad Kamaruddin, Saadi, Md Ghani, Nor Azura, Mohamed Ramli, Norazan

    Published 2015
    “…In theory, the most common training algorithm for Backpropagation algorithms leans on reducing ordinary least squares estimator (OLS) or more specifically, the mean squared error (MSE). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method by Delgoshaei, Aidin

    Published 2016
    “…Then, design of experiments is used to examine the sensitivity of the parameters of each solving algorithm using Taguchi method. …”
    Get full text
    Get full text
    Thesis