Search Results - (( using selection method algorithm ) OR ( data generation method algorithm ))
Search alternatives:
- generation method »
- selection method »
- method algorithm »
- using selection »
- data generation »
-
1
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
2
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…All the techniques assist the decision tree to find the most optimal attributes in each generation of the tree. Results of the reviewed techniques show that attribute selection methods capable to resolve the limitations in ID3 algorithm and increase the performance of the method. …”
Get full text
Get full text
Get full text
Article -
3
Multiple equations model selection algorithm with iterative estimation method
Published 2016“…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
Get full text
Get full text
Get full text
Article -
4
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…This method is used to reduce the stochastic of data generation as the second iteration will have influence of the first iteration data. …”
Get full text
Get full text
Thesis -
5
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
Get full text
Get full text
Thesis -
6
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…One of the main steps after the data collection stage of any method is selecting a subset of the features to be used for the feature selection process. …”
Get full text
Get full text
Thesis -
8
Comparison of attribute selection methods for web texts categorization
Published 2010“…This paper presents a study on the performance of attribute selection methods to be used with Ant-Miner algorithm for web text categorization.The new generated data set by each attribute selection method was classified with Ant-Miner to see the performance in terms of predictive accuracy and the number of rules generated.The results of classification were also compared to C4.5 algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A new ant based rule extraction algorithm for web classification
Published 2011“…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
10
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
Get full text
Get full text
Thesis -
11
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…Experiments via WEKA tool and simulation prototype were conducted to evaluate the methods used. For the runtime path prediction method, the results showed that the path prediction method achieved promising prediction accuracy, and the number of paths involved in the prediction did not affect the accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A clonal selection algorithm model for daily rainfall data prediction
Published 2014“…This study applies the clonal selection algorithm (CSA) in an artificial immune system (AIS) as an alternative method to predicting future rainfall data. …”
Get full text
Get full text
Get full text
Article -
13
Ideal combination feature selection model for classification problem based on bio-inspired approach
Published 2020“…The important step is to idealize the combined feature selection models by finding the best combination of search method and feature selection algorithms. …”
Get full text
Get full text
Book Section -
14
Prediction of UPSR Result using clonal selection algorithm (PUR) / Muhammed Khaleeq Shafii
Published 2012“…Clonal selection algorithm (CLONALG) in AIS is one of the proposed methods to be obtained in real UPSR. …”
Get full text
Get full text
Thesis -
15
Discovering optimal clusters using firefly algorithm
Published 2016“…Existing conventional clustering techniques require a pre-determined number of clusters, unluckily; missing information about real world problem makes it a hard challenge.A new orientation in data clustering is to automatically cluster a given set of items by identifying the appropriate number of clusters and the optimal centre for each cluster.In this paper, we present the WFA_selection algorithm that originates from weight-based firefly algorithm.The newly proposed WFA_selection merges selected clusters in order to produce a better quality of clusters.Experiments utilising the WFA and WFA_selection algorithms were conducted on the 20Newsgroups and Reuters-21578 benchmark dataset and the output were compared against bisect K-means and general stochastic clustering method (GSCM).Results demonstrate that the WFA_selection generates a more robust and compact clusters as compared to the WFA, bisect K-means and GSCM.…”
Get full text
Get full text
Article -
16
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…The third set affirmed that the enhancement on the proposed algorithm, which made use of indexing method that suits the medoids, could boost the performance to about 9 to 27 times in terms of execution time depending on the complexity of the dataset. …”
Get full text
Get full text
Thesis -
17
Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques
Published 2018“…To deal with these problems, this thesis introduces three approved intelligent controllers for hydropower generation. Firstly, a hybrid algorithm namely firefly particle swarm optimization (FPSO) and series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed. …”
Get full text
Get full text
Thesis -
18
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
20
