Search Results - solution ((((validation technique) OR (computing techniques))) OR (mining techniques))
Search alternatives:
- validation technique »
- mining techniques »
-
1
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Medical Diagnosis Using Data Mining Techniques is a system in specifically facilitates the data mining techniques in predicting the appropriate drug prescription of certain condition of patients. …”
Get full text
Get full text
Thesis -
2
A review on optimization of least squares support vector machine for time series forecasting
Published 2016“…This paper presents a review on techniques used to optimize the parameters based on two main classes; Evolutionary Computation and Cross Validation.…”
Get full text
Get full text
Get full text
Article -
3
Application of data mining on polynomial based approach for ECG biometric
Published 2011“…QRS complexes from each dataset was divided into two parts, the training and the testing dataset which was used to prove the validity of the data mining technique applied. Experimental results was classified using Multilayer Perceptron (MLP) in order to confirm the identity of an individual and was compared with the previous research using polynomials without the use of data mining technique. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
Review of firewall optimization techniques
Published 2018“…Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Applied data mining approach in ubiquitous world of air transportation
Published 2011“…This paper is going to use one of successfully used data mining techniques, namely neural network, which is capable of recognizing patterns. …”
Get full text
Get full text
Conference or Workshop Item -
7
Intrusion detection system with data mining approach: a review
Published 2011“…Despite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. …”
Get full text
Get full text
Get full text
Article -
8
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
Get full text
Get full text
Article -
9
Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach
Published 2011“…In this study the data extracted is clustered using two different types of data mining techniques i.e. K-Means and Kohonen Network. …”
Get full text
Get full text
Get full text
Thesis -
10
A numerical method for frequent pattern mining
Published 2009“…Frequent pattern mining is one of the active research themes in data mining. …”
Get full text
Get full text
Article -
11
Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar
Published 2022“…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
Get full text
Get full text
Article -
12
Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar
Published 2022“…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
Get full text
Get full text
Article -
13
Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks
Published 2023“…The suggested network’s performance was trained and validated using Matlab 2020b. The hybrid techniques significantly obtain better results in terms of error analysis, efficiency evaluation, energy analysis, similarity index, and computational time. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Left-handed metamaterial-inspired unit cell for S-Band glucose sensing application
Published 2023“…Computer software; Glucose; Medical problems; Metamaterials; Microwave sensors; Sensors; Computer simulation technology (CST); Experimental verification; Finite integration technique; Glucose concentration; Left handed metamaterial; Parametric -analysis; Sensing characteristics; Transmission coefficients; Solution mining; glucose; water; chemistry; computer simulation; genetic procedures; human; isolation and purification; microwave radiation; procedures; software; Biosensing Techniques; Computer Simulation; Glucose; Humans; Microwaves; Software; Water…”
Article -
15
Predictive crime mapping model using association rule mining for crime analysis
Published 2014“…After training the data, the rules of relationship between attributes were generated. Here, the technique of association rule mining is being used. …”
Get full text
Get full text
Article -
16
A computational algorithm for the numerical solution of nonlinear fractional integral equations
Published 2021“…To check the validation and convergence of the proposed technique, some exam-ples are given. …”
Get full text
Get full text
Article -
17
A COMPUTATIONAL ALGORITHM for the NUMERICAL SOLUTION of NONLINEAR FRACTIONAL INTEGRAL EQUATIONS
Published 2022“…To check the validation and convergence of the proposed technique, some examples are given. …”
Get full text
Get full text
Article -
18
A framework for malware identification based on behavior
Published 2012“…Malware is one of the major security threats in a computer and network environment. Modem malware embeds several techniques in order to complicate malware defence. …”
Get full text
Get full text
Thesis -
19
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Finally, future research direction to find new hybrid rule pruning techniques are provided.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
