Search Results - (( based identification mining algorithm ) OR ( using function a algorithm ))
Search alternatives:
- identification mining »
- based identification »
- mining algorithm »
- using function »
- a algorithm »
- function a »
-
1
Tree-based contrast subspace mining method
Published 2020“…Those subspaces are termed as contrast subspaces. All existing mining contrast subspace methods (i.e. CSMiner and CSMiner-BPR) use density-based likelihood contrast scoring function to estimate the likelihood of a query object to target class against other class in a subspace. …”
Get full text
Get full text
Get full text
Thesis -
2
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
3
Context aware app recommendation using email semantic analysis
Published 2019“…Email is a kind of electronic tool that people used to exchange message. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Discretization of integrated moment invariants for writer identification
Published 2008“…Many induction algorithms found in the literature requires that training data contains only discrete features and some works better on discretized data; in particular rule based approaches like rough sets. …”
Get full text
Get full text
Conference or Workshop Item -
5
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…To aid the aim, a data mining based damage identification approach can be utilized to solve these drawbacks. …”
Get full text
Get full text
Article -
6
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Also a new algorithm for finding the initial point is proposed. …”
Get full text
Get full text
Thesis -
7
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…In our method we have employed Support Vector Machine as one of the best machine learning algorithm for classification and we contribute a new fuzzy membership function thus removing the Support Vector Machine’s weakness points in NER precision and multi classification. …”
Get full text
Get full text
Article -
8
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
9
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
10
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
12
Discovering association rules for mining images datasets: a proposal
Published 2005“…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
Get full text
Get full text
Conference or Workshop Item -
13
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…In this paper we will explain the first part of our research, which is focused on outlier identification and provide a description of why an identified outlier exceptional, based on Distance-Based outlier detection and Density-Based outlier detection.…”
Get full text
Get full text
Conference or Workshop Item -
14
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
15
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
16
Integrated framework with association analysis for gene selection in microarray data classification
Published 2011“…Modifications have been made on the existing association algorithm for mining frequent itemsets, where genes in each itemset were sorted according to their discriminative scores rather than according to lexicographic order. …”
Get full text
Get full text
Thesis -
17
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
18
Identification of debris flow initiation zones using topographic model and airborne laser scanning data
Published 2017“…Conditioning parameters were numerically optimized to identify the arbitrarily maximum model basis function for eleven variables, using MARSplines analysis (algorithm). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
20
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Density-based clustering with three clusters outperformed the K-Means algorithm with three clusters in terms of accuracy. …”
Get full text
Get full text
Article
