Search Results - (( some applications a algorithm ) OR ( based applications mining algorithm ))*
Search alternatives:
- applications mining »
- based applications »
- some applications »
- mining algorithm »
- applications a »
- a algorithm »
-
1
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…During the mining process, the mining algorithm reduces the number of candidate patterns and comparisons by using a new candidate set called candidate head set and several efficient pruning techniques. …”
Get full text
Get full text
Article -
2
-
3
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
4
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
Get full text
Get full text
Thesis -
5
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
6
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
8
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
Get full text
Get full text
Conference or Workshop Item -
9
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010Get full text
Get full text
Thesis -
10
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…However, it is a vital process for many applications such as traffic management, studying of animal behavior, and weather forecasting. …”
Get full text
Get full text
Thesis -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
12
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…The idea was incorporated into a new algorithm called, k-Approximate Modal Haplotypes (&-AMH) algorithm. …”
Get full text
Get full text
Thesis -
13
Context aware app recommendation using email semantic analysis
Published 2019“…In order to increase the functionalities for the email application and further enhance the user experien ce, it is proposed to develop a recommendation system to work with the email application that provide s a recommendation based on the email content. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour
Published 2022“…As a result of this mapping study, five major hybridization strategies were identified in which two-third of solutions have been based on modifying algorithm operators or integration with another metaheuristic. …”
Get full text
Get full text
Get full text
Thesis -
15
A Rough Set-Based Approach for Identifying and Replacing Missing Concepts in Incomplete Sentences in Computer Domain Texts
Published 2026thesis::master thesis -
16
-
17
Classification models for higher learning scholarship award decisions
Published 2018“…Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
Get full text
Get full text
Monograph -
20
Modeling Teacher's Integrity Using Data Mining
Published 2010Get full text
Get full text
Get full text
Get full text
Thesis
