Search Results - (( data optimization mining algorithm ) OR ( data application system algorithm ))
Search alternatives:
- data optimization »
- mining algorithm »
- data application »
- system algorithm »
-
1
-
2
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
4
Adaptive parameter control strategy for ant-miner classification algorithm
Published 2020“…This criterion is responsible for adding only the important terms to each rule, thus discarding noisy data. The ACS algorithm is designed to optimize the IR parameter during the learning process of the Ant-Miner algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Logistic regression methods for classification of imbalanced data sets
Published 2012“…Classification of imbalanced data sets is one of the important researches in Data Mining community, since the data sets in many real-world problems mostly are imbalanced class distribution. …”
Get full text
Get full text
Thesis -
6
Time series data intelligent clustering algorithm for landslide displacement prediction
Published 2018“…Clustering calculation of time series data set is carried out by using hierarchical clustering algorithm according to bending path. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
Get full text
Get full text
Get full text
Thesis -
8
Improvement DACS3 Searching Performance using Local Search
Published 2009Get full text
Get full text
Conference or Workshop Item -
9
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016“…In future work, the accuracy of proposed model can be strengthened by comparative study with other heuristic based searching algorithms such as genetic algorithm, ant colony optimization, swam algorithms and etc.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System
Published 2021“…Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
Get full text
Get full text
Get full text
Article -
12
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…Many existing algorithms for stream clustering of trajectory stream data exploit the time window technique which partition trajectory stream data into time-bins and cluster the segments in each timebin separately. …”
Get full text
Get full text
Thesis -
13
Evaluation of data mining models for predicting concrete strength
Published 2024“…Data mining techniques are becoming more popular in recent years due to their abilities to predict any types of data with high accuracy. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
Get full text
Get full text
Thesis -
15
Improving Patient Rehabilitation Performance In Exercise Games Using Collaborative Filtering Approach
Published 2024journal::journal article -
16
-
17
Tree-based contrast subspace mining method
Published 2020“…In addition, the tree-based method is extended to mine contrast subspaces of query object in categorical data. …”
Get full text
Get full text
Get full text
Thesis -
18
Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry
Published 2023“…This study proposes an integrated approach that combines feature selection with Gaussian Seahorse Optimization Data Mining (GSH-DM) to identify the most relevant features and optimize the data mining process. …”
Get full text
Get full text
Get full text
Article -
19
Web usage mining for UUM learning care using association rules
Published 2004“…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
Get full text
Get full text
Thesis -
20
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis
