Search Results - (( evolution mining techniques ) OR ( solution learning techniques ))
Search alternatives:
- solution learning »
-
1
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution
Published 2018“…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
Get full text
Get full text
Get full text
Book Chapter -
2
Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee
Published 2004“…This evolution provokes the emergence of data mining tools, which perform data analysis and extract data patterns. …”
Get full text
Get full text
Thesis -
3
Global Trends of Educational Data Mining in Online Learning
Published 2023“…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
A review of homogenous ensemble methods on the classification of breast cancer data
Published 2024“…This technique reinforced the use of multiple classifiers in the model. …”
Get full text
Get full text
Get full text
Article -
5
A review of homogenous ensemble methods on the classification of breast cancer data
Published 2024“…This technique reinforced the use of multiple classifiers in the model. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Classification with degree of importance of attributes for stock market data mining
Published 2004“…Many statistical and data mining techniques have been used to predict time series stock market. …”
Get full text
Get full text
Article -
7
-
8
Classification of Immunosignature Using Random Forests for Cancer Diagnosis
Published 2015“…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. The evolution of authoritative immunofingerprint mining technology is exerting a growing influence on comprehensive cancer diagnosis biology. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Global trends of educational data mining in online learning
Published 2023“…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Application of data mining techniques for economic evaluation of air pollution impact and control
Published 2007“…For that purpose, we use data mining techniques. Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
Get full text
Get full text
Thesis -
11
Suspicious online car advertisement detector using principle component analysis (PCA) / Fathiah Husna Firdaus
Published 2019“…Hence, this study is to propose suspicious advertisement detector by using data mining technique which is Principal Component Analysis (PCA). …”
Get full text
Get full text
Thesis -
12
-
13
Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers
Published 2023“…To evaluate the proposed voting technique, the performance of selected individual classifiers and existing voting technique was first examined, followed by the experiment to determine the performance of the proposed model. …”
Article -
14
Using biometric techniques to secure online student assessment: Comparative study
Published 2011“…Many proposed solutions use different biometric techniques to identify and authenticate student continuously, they use different techniques with different measures. …”
Get full text
Get full text
Get full text
Article -
15
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Unlike existing OBL-based techniques, the PMT generates more than one candidate in multiple solution-space directions. …”
Get full text
Get full text
Thesis -
16
A hybrid technique of deep learning neural networks with finite difference method for higher order fractional Volterra-Fredholm integro-differential equations with φ-Caputo operato...
Published 2025“…Moreover, a new hybrid technique which is the combination of deep learning artificial neural network and finite difference method (FDL-ANN) is developed to approximate the solution of higher order VFIDEs. …”
Get full text
Get full text
Get full text
Article -
17
Perceived Challenges and Solutions in Implementing E-Learning as Edutainment Approach Among Educators and Students at Selected Universities in Malaysia
Published 2023“…Edutainment involves the practice of teaching and learning in a light-hearted and informal setting, utilizing techniques such as role-playing, simulations, and games. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Implementing eLearning As Edutainment in Malaysian Higher Education: Challenges and Solution for Educators
Published 2023“…A sample size of 170 educators from 5 colleges in Kuala Lumpur, Malaysia were chosen through a random sampling technique. Study found that the perceived challenges (M=4.32) and the perceived solutions to overcome the challenges towards the implementation of e-learning as edutainment (M=4.15) are both at high level. …”
Get full text
Journal -
19
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
Get full text
Get full text
Article -
20
