Search Results - (( using optimization system algorithm ) OR ( using classification mining algorithm ))
Search alternatives:
- classification mining »
- using classification »
- optimization system »
- system algorithm »
- mining algorithm »
-
1
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
Published 2015“…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Evaluation and optimization of frequent association rule based classification
Published 2014“…Deriving useful and interesting rules from a data mining system is an essential and important task. …”
Get full text
Get full text
Get full text
Article -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
Get full text
Get full text
Thesis -
4
Logistic regression methods for classification of imbalanced data sets
Published 2012“…This thesis aims to develop the simple and effective imbalanced classification algorithms by previously improving the algorithms performance of general classifiers i.e. …”
Get full text
Get full text
Thesis -
5
Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System
Published 2021“…The proposed method has three steps: preprocessing, feature selection and classification. Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
Get full text
Get full text
Get full text
Article -
6
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016“…The aim of this article attempts to study the potential of this method in text classification for sentiment analysis.This study consists of three phases; data preparation; classification model development using three selected Immune System based algorithms i.e. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
8
A novel approach to data mining using simplified swarm optimization
Published 2011“…This deficiency has prompted the need for a new intelligent data mining technique based on stochastic population-based optimization that could discover useful information from data. …”
Get full text
Get full text
Thesis -
9
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Predicting heart disease using ant colony optimization / Siti Aisyah Ismail
Published 2021“…They have to make more effort to detect heart disease, but it is not an easy task. Thus, this study used the Ant Colony Optimization algorithm with data mining called Ant-Miner to predict heart disease because it is said that Ant-Miner’s rule list is simpler than other rule induction algorithms. …”
Get full text
Get full text
Student Project -
11
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
13
-
14
A Performance Evaluation of Chi-Square Pruning Techniques in Class Association Rules Optimization
Published 2018“…The noisy data affected support value of an itemset and so it influenced the performance of an associative classification. The performance of associative classification is relied on the classification where the classification is worked based on the class association rules which generated from frequent rule mining process. …”
Get full text
Get full text
Article -
15
A Performance Evaluation of Chi-Square Pruning Techniques in Class Association Rules Optimization
Published 2018“…The noisy data affected support value of an itemset and so it influenced the performance of an associative classification. The performance of associative classification is relied on the classification where the classification is worked based on the class association rules which generated from frequent rule mining process. …”
Get full text
Get full text
Article -
16
-
17
Classification of metamorphic virus using n-grams signatures
Published 2020“…Then, the virus cluster is evaluated using Naïve Bayes algorithm in terms of accuracy using performance metric. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
19
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
20
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Two publicly activity datasets are used; Wireless Sensor Data Mining (WISDM) and Physical Activity Monitoring for Aging People (PAMAP2). …”
Get full text
Get full text
Thesis
