Search Results - (( based constructive method algorithm ) OR ( variable detection mining algorithm ))
Search alternatives:
- based constructive »
- variable detection »
- method algorithm »
- detection mining »
- mining algorithm »
-
1
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
2
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
4
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
6
-
7
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report -
8
Ant system-based feature set partitioning algorithm for classifier ensemble construction
Published 2016“…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
Get full text
Get full text
Get full text
Article -
9
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study
Published 2021“…The review shows that the mostly used method in Sentiment-analysis is Machine Learning in the field of Opinion-mining. Furthermore, we have identified another variable that can be included to improve the existing algorithm.…”
Get full text
Get full text
Article -
11
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
14
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Instead, it is suggested that results be verified with an alternative method of assessing risk, such as RASH. In conclusion, RASH is an alternative and effective method for the assessment of safety and health risks in building construction in Oman.…”
Get full text
Get full text
Thesis -
15
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
16
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
Published 2018“…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
Get full text
Get full text
Get full text
Article -
17
Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs)
Published 2023“…No pattern was detected regarding selecting the input variables as they are mainly based on the context of the study and the availability of data. …”
Article -
18
Sequential constructive algorithm incorporate with fuzzy logic for solving real world course timetabling problem
Published 2020“…Sequential constructive algorithm is one of the popular methods for solving timetabling problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem
Published 2017“…Route generation is a traveling sales man problem (TSP) and any TSP optimization method is useful for this purpose. Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Optimized feature construction methods for data summarizations of relational data
Published 2014“…In this thesis, novel feature construction methods are introduced and a question of whether or not the descriptive accuracy of the summarized data can benefit from the novel feature construction methods is investigated. …”
Get full text
Get full text
Get full text
Thesis
