Search Results - (( variable integration based algorithm ) OR ( variable extraction mining algorithm ))
Search alternatives:
- variable integration »
- variable extraction »
- integration based »
- extraction mining »
- mining algorithm »
-
1
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…The proposed scheme integrates an ADS and signature-based detection system (SDS) approach for better and rapid intrusion detection. …”
Get full text
Get full text
Thesis -
3
Simultaneous measurement of multiple soil properties through proximal sensor data fusion: a case study
Published 2019“…In this field, it was not possible to predict extractable P and K using all tested sensor combinations or algorithms. …”
Get full text
Get full text
Article -
4
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…To address this, missing customer IDs are filled with the last valid ID, assuming repeated purchases. The FP-Growth algorithm was found to be faster and more effective than the Apriori algorithm in extracting frequent item sets and generating association rules. …”
Get full text
Get full text
Article -
5
RARE: mining colossal closed itemset in high dimensional data
Published 2018“…The task of mining association rules highly relies on the efficiency of the algorithms to extract all frequent itemsets that exist in the database. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…This study also demonstrated the practicality of the apriori algorithm in analyzing extensive datasets to extract actionable insights. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
8
Analysis using data mining techniques: the exploration and review data of diabetes patients / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2025“…Therefore, it is advisable for future studies to implement robust classification algorithms, such as ensemble methods, to effectively manage and extract potential insights.…”
Get full text
Get full text
Get full text
Article -
9
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…The focus of the paper is to propose a hybrid approach for the selection of the most influential input variables for the training and testing of neural network based hybrid models. …”
Get full text
Get full text
Article -
10
Classification of Students' Performance in Computer Programming Course According to Learning Style
Published 2024Proceedings Paper -
11
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…These two adaptive routing algorithms enhance the existing Confidence-based Q (CQ) and Confidence-based Dual Reinforcement Q (CDRQ) Routing Algorithms. …”
Get full text
Get full text
Thesis -
12
Characteristics of electronic cigarette and vape users in Malaysia: Lessons from decision tree analysis
Published 2020“…An Induction Decision Tree (ID3) algorithm, one of the renowned data mining technique, was used in this study. …”
Get full text
Get full text
Get full text
Article -
13
Prediction of electronic cigarette and vape use among Malaysian: decision tree analysis
Published 2017“…Results: By using the ID3 algorithm, it is possible to consider the relationship among variables and to identify the most informative variables for predicting the classification of the instance. …”
Get full text
Get full text
Get full text
Article -
14
ENGINEERING DESIGN WITH PSO ALGORITHM
Published 2019“…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
Get full text
Get full text
Final Year Project -
15
-
16
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…First, unified ADALINEs based fundamental component extraction algorithm is proposed for dual functionality. …”
Get full text
Get full text
Thesis -
17
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Unlike the existing optimization algorithm, VL-WIDE features the capability of searching different lengths of solutions to cover the variable number of cloudlets for deployment. …”
Get full text
Get full text
Thesis -
18
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…Consequently, a direct block multistep method with utilization of variable step size strategy is proposed. This method was developed for computing the solution at four points simultaneously and the derivation based on numerical integration as well as using interpolation approach. …”
Get full text
Get full text
Get full text
Article -
19
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…Consequently, a direct block multistep method with utilization of variable step size strategy is proposed. This method was developed for computing the solution at four points simultaneously and the derivation based on numerical integration as well as using interpolation approach. …”
Get full text
Get full text
Get full text
Article -
20
