Search Results - (( evolution computing techniques ) OR ( solution mining techniques ))*

Search alternatives:

Refine Results
  1. 1

    A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution by Abdulrazak Yahya, Saleh, Haza Nuzly, Abdull Hamed, Siti Mariyam, Shamsuddin, Ashraf, Osman Ibrahim

    Published 2018
    “…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Analysis of traffic accidents using association rules mining technique / Abdullah Murshid Abdul Rahim by Abdul Rahim, Abdullah Murshid

    Published 2022
    “…Analysis of traffic accidents using data mining techniques is a project to identify the traffic accident pattern analysis using data mining techniques. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…Medical Diagnosis Using Data Mining Techniques is a system in specifically facilitates the data mining techniques in predicting the appropriate drug prescription of certain condition of patients. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Bioleaching and biosorption of heavy metals from gold mine tailings by Aspergillus fumigatus in Penjom, Malaysia by Jalili Seh Bardan, Bahi

    Published 2012
    “…The ability of A. fumigatus to remove As, Fe, Mn, Pb and Zn from synthetic solutions and from leachate derived from gold mine during bioleaching was assessed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application of data mining on polynomial based approach for ECG biometric by Sidek, Khairul Azami, Khalil, Ibrahim

    Published 2011
    “…In this paper, the application of data mining techniques on polynomial based approach for better electrocardiogram (ECG) authentication mechanism is presented. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Text mining in bioinformatics: past, present and future by Faiiazee, Hadee, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abdullah, Rusli, Samsudin, Khairulmizam

    Published 2012
    “…Dealing with this situation needs to deploy innovative methods and techniques. In this paper, we identify the current heavily used methods for biomedical text mining, their capabilities and developments, some proposed solution and how to evaluate performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach by Azmi, Abu Bakar

    Published 2011
    “…In this study the data extracted is clustered using two different types of data mining techniques i.e. K-Means and Kohonen Network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  10. 10

    Review of firewall optimization techniques by Shakirah, Saidin, Mohamad Fadli, Zolkipli

    Published 2018
    “…Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Differential evolution technique of HEPWM for three-phase voltage source inverter by Azziddin, Mohamad Razali, Kamisman, Norazelina, Jurifa, Mat Lazi, Bahari, Norhazilina

    Published 2016
    “…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter by Kamisman, Norazelina

    Published 2018
    “…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Accelerated mine blast algorithm for ANFIS training for solving classification problems by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
    Get full text
    Get full text
    Article
  14. 14

    Predictive crime mapping model using association rule mining for crime analysis by Asmai, S. A., Rosmiza Wahida, Abdullah, Sabrina, Ahmad

    Published 2014
    “…After training the data, the rules of relationship between attributes were generated. Here, the technique of association rule mining is being used. …”
    Get full text
    Get full text
    Article
  15. 15

    Intrusion detection system with data mining approach: a review by Khalilian, Majdid, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. The main problem in intrusion detection system is accuracy to detect new attacks therefore unsupervised methods should be applied. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Text mining in mosquito-borne disease: A systematic review by Ong, Song Quan, Maisarah Mohamed Pauzi, Keng, Hoon Gan

    Published 2022
    “…In this review, we survey the recent works in the text mining techniques used in combating mosquito-borne diseases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Applied data mining approach in ubiquitous world of air transportation by Reza, S.M., Wah, T.Y., Lahsasna, A.

    Published 2011
    “…This paper is going to use one of successfully used data mining techniques, namely neural network, which is capable of recognizing patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    HEAT EXCHANGER NETWORK SYNTHESIS AND OPTIMIZATION BY PINCH ANALYSIS AND DIFFERENTIAL EVOLUTION METHOD by NGO , THI PHUONG THUY

    Published 2016
    “…This metadology way uses an algorithm which combines Pinch Design Method and Differential Evolution Method. In this technique, the Heat Exchanger Network synthesis is carried out in three levels. …”
    Get full text
    Get full text
    Thesis