Search Results - (( java application based algorithm ) OR ( model evaluation mining algorithm ))
Search alternatives:
- application based »
- evaluation mining »
- java application »
- model evaluation »
- mining algorithm »
-
1
Evaluation of data mining models for predicting concrete strength
Published 2024“…These models are all evaluated with hyperparameter tuning and different feature selection techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023“…Decision making; Decision trees; Forecasting; Health care; Soft computing; Accuracy evaluation; Classification technique; Data mining algorithm; Descriptive analysis; Disease risks; Infectious disease; Risk prediction models; Systematic literature review; Data mining…”
Conference Paper -
3
Prime-based method for interactive mining of frequent patterns
Published 2010“…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
Get full text
Get full text
Thesis -
4
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…The research proposes new formula and algorithm which allows the evaluation of energy efficiency for the hardware of bitcoins mining. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
6
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
8
-
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…The efficiency coefficient and mean square error (MSE) are used to evaluate the performance of the ICA-ANN model. Moreover, the proposed model is compared with a pre-developed ANN approach in order to verify the efficiency of the proposed methodology. …”
Get full text
Get full text
Article -
11
-
12
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…Model performance evaluators such as the AUROC, RSME, F-measure, MAE, and ACC were employed to check the predictive capabilities and accuracies of the models. …”
Get full text
Get full text
Article -
13
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…Building classification models from such imbalanced data sets is a relatively new challenge in the machine learning and data mining community because many traditional classification algorithms assume similar proportions of majority and minority classes. …”
Get full text
Get full text
Get full text
Article -
14
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
15
-
16
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…The linear models and rules developed from the M5P algorithm were adopted for the FT indicator prediction modelling of 14 attributes. …”
Get full text
Get full text
Thesis -
17
Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining
Published 2023“…It proceeds through three phases of Need Analysis, Development of the Model and Evaluation of the Model. Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
Get full text
Get full text
Thesis -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
20
Classification of cervical cancer using random forest
Published 2022“…Model evaluation has been conducted to identify the robust data mining algorithm in the prediction of cervical cancer risk. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
