Search Results - evolution ((evaluation techniques) OR (((mining techniques) OR (learning techniques))))

Refine Results
  1. 1

    Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers by Azmi M.S.M., Sulaiman M.N.

    Published 2023
    “…To evaluate the proposed voting technique, the performance of selected individual classifiers and existing voting technique was first examined, followed by the experiment to determine the performance of the proposed model. …”
    Article
  2. 2

    A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution by Abdulrazak Yahya, Saleh, Haza Nuzly, Abdull Hamed, Siti Mariyam, Shamsuddin, Ashraf, Osman Ibrahim

    Published 2018
    “…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3

    Global Trends of Educational Data Mining in Online Learning by Chen, Chwen Jen, Teh, Chee Siong, Dexter Sigan, John

    Published 2023
    “…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Global trends of educational data mining in online learning by Nie Hui Ling, Chwen Jen Chen, Chee Siong Teh, Dexter Sigan John, Looi Chin Ch’ng, Yoon Fah Lay

    Published 2023
    “…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Many statistical and data mining techniques have been used to predict time series stock market. …”
    Get full text
    Get full text
    Article
  6. 6

    PMT: opposition-based learning technique for enhancing meta-heuristic performance by Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…Addressing these issues, this research proposes a new general opposition-based learning (OBL) technique inspired by a natural phenomenon of parallel mirrors systems called the parallel mirrors technique (PMT). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…Addressing these OBL limitations, this research proposes a new general OBL technique inspired by a natural phenomenon of parallel mirrors systems called the Parallel Mirrors Technique (PMT). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…For that purpose, we use data mining techniques. Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison of detection model using machine learning on android malware / Muhammad Ikmal Ihsan by Ihsan, Muhammad Ikmal

    Published 2022
    “…The result of the comparison using the machine learning techniques for Android malware dataset discovered that SVM machine learning get the highest percentage with accuracy of 0.93. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. The evolution of authoritative immunofingerprint mining technology is exerting a growing influence on comprehensive cancer diagnosis biology. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…The median convergence traces have been compared with two different algorithms based on differential evolution, i:e: Ensemble of Constraint Handling Techniques (ECHT) and Stochastic Ranking Differential Evolution (SRDE). …”
    Get full text
    Get full text
    Article
  12. 12

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Email spam classification based on deep learning methods: A review by Tusher, Ekramul Haque, Mohd Arfian, Ismail, Anis Farihan, Mat Raffei

    Published 2025
    “…Deep learning has become a potent collection of techniques for addressing intricate issues such as spam classification in recent times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee by Hiromi , Wong, Siew , Lan, Valery, Fred Lee

    Published 2004
    “…This evolution provokes the emergence of data mining tools, which perform data analysis and extract data patterns. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Finally, the performance of the proposed methods is also assessed using the performance indicators such as various error measurement criteria, detection rate and false alarm and compared with recent works. Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Lattice Imperfections in Intermetallic Ti-Al alloys: an X-Ray Diffraction study of the microstructure by the Rietveld method by Lee Liu Mei

    Published 2008
    “…The values of all the above defect parameters have been evaluated and compared for elucidating a better structure-property relationship.…”
    Get full text
    Learning Object
  17. 17

    Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review by Zulkifli, Mansor, Irawan, Addie, Mohammad Fadhil, Abas

    Published 2023
    “…The analysis encompasses optimization techniques, sensor integration, machine learning, and adaptive control methods, evaluating their impact on robot capabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Erosion corrosion and tribological behavior of TIG torch composite layers by Maleque, Md. Abdul

    Published 2016
    “…Among the coating techniques, tungsten inert gas (TIG) torch melting technique is currently gaining wide acceptance in surface coating of engineering part component for tribological use. …”
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20

    Deep learning-enhanced jewelry material jadeite jade quality assessment by Meng, Liang, Raja Ahmad Effendi, Raja Ahmad Azmeer, Sun, Wei, Mo, Lili, Abdul Rahman, Ahmad Rizal, Hsu, Yu-Lin, Barron, Deirdre

    Published 2024
    “…Jadeite jade, renowned for its unique texture and cultural significance, stands as the epitome of jade varieties, embodying the latest evolution of China’s jade culture. This research endeavors to establish an AI model for precisely screening jadeite quality, employing deep learning techniques to revolutionize jadeite design and detection. …”
    Get full text
    Get full text
    Article