Search Results - (( re evaluation modified algorithm ) OR ( miner classification system algorithm ))
Search alternatives:
- classification system »
- miner classification »
- evaluation modified »
- system algorithm »
- re evaluation »
-
1
Adaptive parameter control strategy for ant-miner classification algorithm
Published 2020“…This paper presents a new hybrid Ant-Miner classification algorithm and ant colony system (ACS), called ACS-Ant Miner. …”
Get full text
Get full text
Get full text
Article -
2
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…The Ant Miner system plays an important role in running the Ant Colony Optimization Algorithm and making comparison in this case study.…”
Get full text
Get full text
Thesis -
3
Predicting heart disease using ant colony optimization / Siti Aisyah Ismail
Published 2021Get full text
Get full text
Student Project -
4
Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani
Published 2021“…Besides, in this study, the Ant-Miner system also plays an important role, which can train the data several times to achieve the highest percentage of predictive accuracy and make comparisons to achieve a good classification model. …”
Get full text
Get full text
Student Project -
5
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
Get full text
Get full text
Thesis -
7
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…The randomness of Enhanced 3D-AES then is re-evaluated and it has passed all 15 statistical tests for all seven data categories. …”
Get full text
Get full text
Thesis -
8
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…This research first proposes an improved continuous MOPSO to address the rapid clustering problem that exists in the basic PSO algorithm using three improvement strategies: re-initialization of particles, systematic switch of best solutions and mutation on global best selection. …”
Get full text
Get full text
Get full text
Thesis -
9
Optimizing decentralized exam timetabling with a discrete whale optimization algorithm
Published 2025“…—In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
10
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
11
Sentiment analysis of customer reviews for Konda Kondi Cafe & Bistro
Published 2025“…The data was pre-processed using tokenization, stop-word removal, and stemming techniques to ensure quality inputs. Machine learning algorithms such as Support Vector Machine (SVM), Naive Bayes (NB), and Decision Tree (DT) were applied using RapidMiner to build classification models. …”
Get full text
Get full text
Student Project -
12
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Enhancing Autonomous Guided Vehicles with Red-Black TOR Iterative Method
Published 2023“…The existing block over-relaxation method and its variants evaluate the computation by obtaining four Laplacian potentials per computation in groups. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…It involves the process of re-testing software after modifications. Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
Get full text
Get full text
Thesis -
15
-
16
Artificial immune systems (GA-AIS) enabled power loss mitigation in distributed generation: X3PAIS optimization approaches
Published 2025“…DG requires an extensive re-evaluation of the current power system, as it modifies energy losses and line flows. …”
Article -
17
Methane plume localization with enhanced self-best reduction and Gaussian improved particle swarm optimization (GiPSO)
Published 2024“…The research focuses on three questions to enhance the drone swarm optimization algorithm. These three questions steer the research in three separate domains, which helps the evaluation of the performance of our research. …”
Get full text
Get full text
Thesis -
18
Robust Kernel Density Function Estimation
Published 2010“…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. …”
Get full text
Get full text
Thesis
