Search Results - evolution ((detection technique) OR (((computing techniques) OR (mining techniques))))
Search alternatives:
- mining techniques »
-
1
Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee
Published 2004“…The report will cover the literature review that started with an introduction to computer auditing, introduction to data mining, data mining techniques (classification, neural network and sequential analysis), and the existing data mining software. …”
Get full text
Get full text
Thesis -
2
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
Get full text
Get full text
Thesis -
3
A review of homogenous ensemble methods on the classification of breast cancer data
Published 2024“…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
Get full text
Get full text
Get full text
Article -
4
A review of homogenous ensemble methods on the classification of breast cancer data
Published 2024“…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
Get full text
Get full text
Get full text
Article -
6
Overview and future opportunities of sentiment analysis approaches for big data
Published 2016“…The contribution of this paper is two-fold: (i) this study reviews the state of the art of SA approaches. including sentiment polarity detection, SA features (explicit and implicit), sentiment classification techniques and applications of SA and (ii) this study reviews the suitability of SA approaches for application in the big data frameworks, as well as highlights the gaps and suggests future works that should be explored. …”
Get full text
Get full text
Get full text
Article -
7
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
8
Metric-based code smell detection technique for python software
Published 2018“…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
Get full text
Get full text
Thesis -
9
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…In this work, a new islanding detection technique is proposed based on combination of Slantlet Transform and Ridgelet Probabilistic Neural Network to detect islanding conditions from other disturbance for a 250-kW PV array connected to a typical North American distribution grid and a wind farm power generation system. …”
Get full text
Get full text
Thesis -
10
Classification with degree of importance of attributes for stock market data mining
Published 2004“…Many statistical and data mining techniques have been used to predict time series stock market. …”
Get full text
Get full text
Article -
11
-
12
Lattice Sphere Detection Techniques In Block Data Transmission And Multiuser Wireless Systems
Published 2013“…Owing to its high computational load, lattice sphere detection (LSD) technique and its variants had been proposed. …”
Get full text
Get full text
Thesis -
13
A wireless precoding technique for millimetre-wave MIMO system based on SIC-MMSE
Published 2019“…To improve the conventional mm-wave MIMO nodal detection and coordination performance, the system processes data using symbolized error vector technique for linearization. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Antipatterns detection approaches in object-oriented design: a literature review
Published 2012“…Design pattern detection is a useful technique for gaining knowledge on the design issues of existing systems and improves the system's comprehension, which consequently enhance the software maintainability and evolution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution
Published 2018“…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
Get full text
Get full text
Get full text
Book Chapter -
17
Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers
Published 2023“…In evolution and ubiquitous computing systems, accelerometer-based human activity recognition has huge potential in a large number of application domains. …”
Article -
18
Classification of Immunosignature Using Random Forests for Cancer Diagnosis
Published 2015“…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. The evolution of authoritative immunofingerprint mining technology is exerting a growing influence on comprehensive cancer diagnosis biology. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin
Published 2012“…With the help of webcam, human can interact with computer by using their hand gesture. With this technique we can substitute the use of mouse or keyboard to control slide presentation. …”
Get full text
Get full text
Book Section -
20
Segmentation of Retinal Vasculature using Active Contour Models (Snakes)
Published 2009“…Active contour model (snake) that based on level sets, techniques of curve evolution, and Mumford-Shah functional for segmentation is then used to segment out the detected retinal vessel and produce a complete retinal vasculature. …”
Get full text
Final Year Project
