Search Results - (( variable detection mining algorithm ) OR ( parallel optimisation based algorithm ))
Search alternatives:
- parallel optimisation »
- variable detection »
- optimisation based »
- detection mining »
- mining algorithm »
-
1
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
2
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…The optimisation of tool path length based on ACO algorithm ascertained that the cutting tool remove the uncut line once and able to eliminate the uncut region in the shortest tool path length. …”
Get full text
Get full text
Article -
3
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
4
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
5
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
7
-
8
-
9
-
10
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…The results of this research are important in developing a routing algorithm for CHR6o3.…”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
13
Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study
Published 2021“…The review shows that the mostly used method in Sentiment-analysis is Machine Learning in the field of Opinion-mining. Furthermore, we have identified another variable that can be included to improve the existing algorithm.…”
Get full text
Get full text
Article -
14
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
15
A Simulated Annealing-Based Hyper-Heuristic For The Flexible Job Shop Scheduling Problem
Published 2023“…Flexible job shop scheduling problem (FJSP) is a common optimisation problem in the industry. The use of parallel machines allows an operation to be executed on a machine assigned from a set of alternative machines, raising a combination of machine assignment and job sequencing sub-problems. …”
Get full text
Get full text
Thesis -
16
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
17
Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs)
Published 2023“…No pattern was detected regarding selecting the input variables as they are mainly based on the context of the study and the availability of data. …”
Article -
18
Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm
Published 2024“…The optimum parameters were determined according to the design flow, constraints value and mathematical algorithm. Based on MOGA-II analysis, every workflow generated 1600 feasible solutions for optimization that meet the design space requirement. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
20
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…Infected palms are asymptomatic throughout the disease's early stages, making disease detection challenging. The survival of affected trees must detect BSR at the mild infected (T1) stage. …”
Get full text
Get full text
Thesis
