Search Results - (( variable detection mining algorithm ) OR ( variable extraction method algorithm ))
Search alternatives:
- variable extraction »
- variable detection »
- extraction method »
- detection mining »
- mining algorithm »
- method algorithm »
-
1
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
2
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
3
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
4
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
5
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
Get full text
Get full text
Thesis -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
7
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
9
-
10
Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm
Published 2018“…This study concluded that remote sensing approach combined with data mining approaches such as ANN algorithms have great potential in monitoring vast plantation areas in a rapid and inexpensive manner.…”
Get full text
Get full text
Get full text
Thesis -
11
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
Get full text
Get full text
Thesis -
13
Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia
Published 2023“…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
Get full text
Get full text
Article -
14
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
Get full text
Get full text
Get full text
Thesis -
15
Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study
Published 2021“…The review shows that the mostly used method in Sentiment-analysis is Machine Learning in the field of Opinion-mining. Furthermore, we have identified another variable that can be included to improve the existing algorithm.…”
Get full text
Get full text
Article -
16
-
17
A novel theoretical and practical methodology for extracting the parameters of the single and double diode Photovoltaic models
Published 2022“…However, there is no method to date that can guarantee the extracted parameter of the PV model is the most accurate one. …”
Get full text
Get full text
Article -
18
The impact of the combat method on radiomics feature compensation and analysis of scanners from different manufacturers
Published 2024“…Conclusions: The Combat algorithm has reduced variability in radiomic features from different scanners. …”
Get full text
Get full text
Get full text
Article -
19
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
20
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis
