Search Results - (evolution OR solution) ((computing techniques) OR (mining techniques))

Search alternatives:

Refine Results
  1. 1

    Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee by Hiromi , Wong, Siew , Lan, Valery, Fred Lee

    Published 2004
    “…The report will cover the literature review that started with an introduction to computer auditing, introduction to data mining, data mining techniques (classification, neural network and sequential analysis), and the existing data mining software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…Medical Diagnosis Using Data Mining Techniques is a system in specifically facilitates the data mining techniques in predicting the appropriate drug prescription of certain condition of patients. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A review of homogenous ensemble methods on the classification of breast cancer data by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2024
    “…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A review of homogenous ensemble methods on the classification of breast cancer data by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2024
    “…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution by Abdulrazak Yahya, Saleh, Haza Nuzly, Abdull Hamed, Siti Mariyam, Shamsuddin, Ashraf, Osman Ibrahim

    Published 2018
    “…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Review of firewall optimization techniques by Shakirah, Saidin, Mohamad Fadli, Zolkipli

    Published 2018
    “…Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Applied data mining approach in ubiquitous world of air transportation by Reza, S.M., Wah, T.Y., Lahsasna, A.

    Published 2011
    “…This paper is going to use one of successfully used data mining techniques, namely neural network, which is capable of recognizing patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Intrusion detection system with data mining approach: a review by Khalilian, Majdid, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…Despite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Accelerated mine blast algorithm for ANFIS training for solving classification problems by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
    Get full text
    Get full text
    Article
  11. 11

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Many statistical and data mining techniques have been used to predict time series stock market. …”
    Get full text
    Get full text
    Article
  12. 12

    Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach by Azmi, Abu Bakar

    Published 2011
    “…In this study the data extracted is clustered using two different types of data mining techniques i.e. K-Means and Kohonen Network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  14. 14

    Left-handed metamaterial-inspired unit cell for S-Band glucose sensing application by Islam M.T., Hoque A., Almutairi A.F., Amin N.

    Published 2023
    “…Computer software; Glucose; Medical problems; Metamaterials; Microwave sensors; Sensors; Computer simulation technology (CST); Experimental verification; Finite integration technique; Glucose concentration; Left handed metamaterial; Parametric -analysis; Sensing characteristics; Transmission coefficients; Solution mining; glucose; water; chemistry; computer simulation; genetic procedures; human; isolation and purification; microwave radiation; procedures; software; Biosensing Techniques; Computer Simulation; Glucose; Humans; Microwaves; Software; Water…”
    Article
  15. 15

    Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers by Azmi M.S.M., Sulaiman M.N.

    Published 2023
    “…In evolution and ubiquitous computing systems, accelerometer-based human activity recognition has huge potential in a large number of application domains. …”
    Article
  16. 16

    Predictive crime mapping model using association rule mining for crime analysis by Asmai, S. A., Rosmiza Wahida, Abdullah, Sabrina, Ahmad

    Published 2014
    “…After training the data, the rules of relationship between attributes were generated. Here, the technique of association rule mining is being used. …”
    Get full text
    Get full text
    Article
  17. 17

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…Malware is one of the major security threats in a computer and network environment. Modem malware embeds several techniques in order to complicate malware defence. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Rule pruning techniques in the ant-miner classification algorithm and its variants: A review by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2018
    “…Finally, future research direction to find new hybrid rule pruning techniques are provided.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Soft computing techniques, such as bio-inspired algorithms, can be used for information processing by employing methods which are capable to deal with imprecision and uncertainty. …”
    Get full text
    Get full text
    Research Reports