Search Results - (( pattern machine algorithm ) OR ( between ((working algorithm) OR (mining algorithm)) ))
Search alternatives:
- machine algorithm »
- working algorithm »
- mining algorithm »
-
1
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
Get full text
Get full text
Article -
2
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
Get full text
Get full text
Thesis -
4
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. …”
Get full text
Get full text
Book Section -
5
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…Kernel machines provide a powerful data mining technique that may be used for pattern matching in the presence of complex data. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Data Mining for Building Neural Protein Sequence Classification Systems with Improved Performance
Published 2003“…Traditionally, two protein sequences are classified into the same class if their feature patterns have high homology. These feature patterns were originally extracted by sequence alignment algorithms, which measure similarity between an unseen protein sequence and identified protein sequences. …”
Get full text
Get full text
Get full text
Proceeding -
7
Comparison of expectation maximization and K-means clustering algorithms with ensemble classifier model
Published 2018“…Meanwhile, Kmeans clustering algorithm has also been reported has widely known for solving most unsupervised classification problems. …”
Get full text
Get full text
Get full text
Article -
8
Classification Of Gender Using Global Level Features In Fingerprint For Malaysian Population
Published 2016“…For data mining classification part, there are four popular machine learning classifiers used which are Bayesian Net.work (Bayes Net.), Multilayer Perceptron Neural Network (MLPNN), K-Nearest Neighbor (KNN) and Support Vector Machine (SVM). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…The results of the proposed modified algorithm for Web page recommendation system achieve an accuracy of 76-82% which is significantly outperforming than the previous work.…”
Get full text
Get full text
Get full text
Thesis -
10
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
11
Machining surface roughness monitoring using acoustic emission method
Published 2010“…The objective of this project is to collect the data acquisition of the experiment by operating milling process, to study the correlation of AE parameter with work piece surface quality by comparing the AE signals with average roughness, Ra of the work piece’s surface measured by using Perthometer, and to develop algorithm for online machining condition monitoring. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Classification of cervical cancer using random forest
Published 2022“…Model evaluation has been conducted to identify the robust data mining algorithm in the prediction of cervical cancer risk. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Finger Motion In Classifying Offline Handwriting Patterns
Published 2017“…Therefore, this study aims to relate the finger movements to handwriting patterns. The specific objectives include: (i) to determine whether finger motion attributes can distinguish patterns of handwriting, (ii) classify handwriting patterns by sentence inclination based on different finger motion, (iii) to investigate the rule-reasoning statements between the finger motion and the handwriting inclinations. …”
Get full text
Get full text
Monograph -
14
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…The Proof-of-Work (PoW) algorithm is used for mining ‘Bitcoin’ which is consumed enormous computational power. …”
Get full text
Get full text
Get full text
Article -
15
Predicting the success of suicide terrorist attacks using different machine learning algorithms
Published 2022“…With an accuracy rate of 98.4% and an AUC-ROC score of 99.9%, the Random Forest classifier was the most accurate among all other algorithms. This model is more trustworthy than previous work and provides a useful comparison between machine learning methods and an artificial neural network because it is less dependent and has a multiclass target feature.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Mining dense data: Association rule discovery on benchmark case study
Published 2016“…In this article, we present comparison result between Apriori and FP-Growth algorithm in generating association rules based on a benchmark data from frequent itemset mining data repository. …”
Get full text
Article -
18
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…In particular, the proposed algorithm obtains satisfactory compromise between the number of cuts and classification accuracy.…”
Get full text
Get full text
Thesis -
19
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
20
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
Get full text
Get full text
Thesis
