Search Results - (( using motivation mining algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- motivation mining »
- implication based »
- using motivation »
- mining algorithm »
- java implication »
-
1
-
2
Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting
Published 2014“…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
Get full text
Get full text
Article -
3
Logistic regression methods for classification of imbalanced data sets
Published 2012“…These results can be seen as further explanation on the success of Truncated Newton method in TR-KLR and TR Iteratively Re-weighted Least Square (TR-IRLS) algorithm respectively, because of the equivalence of iterative method used by these algorithms. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024thesis::doctoral thesis -
8
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
9
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
10
Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart...
Published 2023“…The Cyber Parental Control Framework (CPCF) employs a multistep approach and a novel web mining technique. It uses the URL blacklist and whitelist methods as the first and second filter layers. …”
Get full text
Get full text
Get full text
Thesis -
11
Identifying Features Eligiblity For Blood Donors' Preferences Using Artificial Neural Networks Prediction Performances
Published 2017“…Another least preferences recommended by FA are donation fear, favourite donation center, marriage status, up to date donation, interested to overcome donation fear, high overall donation volume, and donation motivation by celebrities. These findings of this study contribute as beneficial information to improve blood donation or healthcare service, as guide to collect and arrange data into prediction or another data mining problems, and extend another study for flexible algorithms with various datasets.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
An early warning system for students at risk using supervised machine learning
Published 2024“…To keep up with the course's pace, students must be self-motivated, well-organized, and have time management skills. …”
Get full text
Get full text
Get full text
Article -
13
Performance Prediction of Compulsory Subjects and Recommendation of Subject Options for China’s New College Entrance Examination
Published 2026“…Four machine learning algorithms: Naïve Bayes (NB), Decision Tree (DT), Artificial Neural Networks (ANNs), and Support Vector Machines (SVMs) were evaluated using accuracy, precision, recall, F1 score, and Matthews Correlation Coefficient (MCC). …”
Get full text
Get full text
Get full text
Thesis -
14
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…In phase 3, Latent Semantic Analysis (LSA) and tfidf term weighting are used in order to determine document relatedness. …”
Get full text
Get full text
Thesis -
15
A coherent knowledge-driven deep learning model for idiomatic - aware sentiment analysis of unstructured text using Bert transformer
Published 2023“…Sentiment analysis algorithms used to classify the sentiment of tweets on social media platforms such as Twitter face challenges when dealing with idiomatic expressions and figurative language used by users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
