Search Results - (( based relation between algorithm ) OR ( miner classification system algorithm ))*
Search alternatives:
- classification system »
- miner classification »
- between algorithm »
- relation between »
- system algorithm »
- based relation »
-
1
Adaptive parameter control strategy for ant-miner classification algorithm
Published 2020“…This paper presents a new hybrid Ant-Miner classification algorithm and ant colony system (ACS), called ACS-Ant Miner. …”
Get full text
Get full text
Get full text
Article -
2
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…The Ant Miner system plays an important role in running the Ant Colony Optimization Algorithm and making comparison in this case study.…”
Get full text
Get full text
Thesis -
3
Predicting heart disease using ant colony optimization / Siti Aisyah Ismail
Published 2021Get full text
Get full text
Student Project -
4
Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani
Published 2021“…Besides, in this study, the Ant-Miner system also plays an important role, which can train the data several times to achieve the highest percentage of predictive accuracy and make comparisons to achieve a good classification model. …”
Get full text
Get full text
Student Project -
5
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
Get full text
Get full text
Thesis -
7
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019“…Combinatorial testing is the way to encounter exhaustive testing through the testing of every input values and every combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Finding the optimal road routes between two locations in East Kuala Lumpur by using A* Algorithm based on GPS data / Ilina Syazwani Musa
Published 2007“…In this paper, we will use A* algorithm in road route in East Kuala Lumpur based on GPS data on the Garmin platform. …”
Get full text
Get full text
Thesis -
9
-
10
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019“…In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy and named as (CTJ). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Sentiment analysis of customer reviews for Konda Kondi Cafe & Bistro
Published 2025“…The data was pre-processed using tokenization, stop-word removal, and stemming techniques to ensure quality inputs. Machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes (NB), and Decision Tree (DT) were applied using RapidMiner to build classification models. …”
Get full text
Get full text
Student Project -
12
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
14
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…Additionally, social media algorithms moderated the relationship between the need for relatedness and fitness-related health information behavior. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025Get full text
Get full text
Article -
17
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025Get full text
Get full text
Article -
18
Autonomous multi satellites assembly in keplerian orbits
Published 2013“…The guidance algorithms are based on defining the velocity profile of each satellite in two different segment of space. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
Published 2012“…However, these two measures are found to be inverse relations of one another. Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
Get full text
Get full text
Get full text
Article -
20
Multi-objective pareto ant colony system based algorithm for generator maintenance scheduling
Published 2022“…A multi-objective PACS algorithm based on sequential strategy which considers unit commitment and GMS problem separately is proposed to obtain solution for a proposed GMS model. …”
Get full text
Get full text
Get full text
Thesis
