Search Results - (( java application means algorithm ) OR ( parameter estimation mining algorithm ))
Search alternatives:
- application means »
- estimation mining »
- java application »
- mining algorithm »
- means algorithm »
- parameter »
-
1
Tree-based contrast subspace mining method
Published 2020“…Hence, this thesis presents the optimization of parameters values for the tree-based method by genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…In this study we advance a model for mining of user’s navigation pattern. The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
Get full text
Get full text
Article -
3
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…For its fast convergence and for its efficient search procedure, the self-adaptation is proposed in the parameters of the proposed hybrid algorithm. The effectiveness of this algorithm is verified by applying it on the unconstrained and constrained test functions through a simulation study. …”
Get full text
Get full text
Thesis -
4
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
7
-
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Prediction of Temerloh River water level for prediction of flood using Artificial Neural Network (ANN) method
Published 2015“…The purpose of this project is to research more about the flood occurrence in Temerloh, Pahang. The data mining approaches using artificial neural network (ANN) techniques will be use to conduct this research for flood estimation. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…To enhance the selection of most highly ranking features, irrelevant features are ‘pruned’ based on determined boundary threshold. In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. …”
Get full text
Get full text
Thesis -
11
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
13
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…This current study proposes an intelligent data mining approach for the Machine Learning- Adaptive Distance Relay (ML-ADR) fault classification model using novel extracted 1-cycle transient voltage and current signals hidden knowledge from both healthy and faulty lines parameters. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak
Published 2022“…Waikato Environment for Knowledge Analysis (WEKA) version 3.8 was adopted for data mining analysis at two levels of classification stages. …”
Get full text
Get full text
Monograph -
17
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
20
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
