Search Results - solution ((validation technique) OR (((mining techniques) OR (learning techniques))))
Search alternatives:
-
1
Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar
Published 2022“…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
Get full text
Get full text
Article -
2
Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar
Published 2022“…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
Get full text
Get full text
Article -
3
Application of data mining on polynomial based approach for ECG biometric
Published 2011“…QRS complexes from each dataset was divided into two parts, the training and the testing dataset which was used to prove the validity of the data mining technique applied. Experimental results was classified using Multilayer Perceptron (MLP) in order to confirm the identity of an individual and was compared with the previous research using polynomials without the use of data mining technique. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
A review on optimization of least squares support vector machine for time series forecasting
Published 2016“…This paper presents a review on techniques used to optimize the parameters based on two main classes; Evolutionary Computation and Cross Validation.…”
Get full text
Get full text
Get full text
Article -
5
Review of firewall optimization techniques
Published 2018“…Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
Get full text
Get full text
Article -
8
Cyberbullying in e-Learning platform: a text mining analytics
Published 2019“…This paper also aimed to propose a practical solution to combat cyberbullying in an educational platform, and shed some lights on the potential applications of text mining techniques in educational research.…”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Applied data mining approach in ubiquitous world of air transportation
Published 2011“…This paper is going to use one of successfully used data mining techniques, namely neural network, which is capable of recognizing patterns. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Framework for evaluating and selecting mobile-learning applications using multi criteria decision making techniques
Published 2021“…The study is conducted in four main phases: a survey and interview of decision-makers and users to identify the evaluation criteria, development of the framework based on the Evaluation Theory, development of a new decision-making technique by integrating Fuzzy Analytical Hierarchy Process (FAHP), Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), and GAP Analysis (GA) to handle user requirements mismatches, and validation of the applicability and reliability of MLAESF using experts review, case study and yardstick validation. …”
Get full text
Get full text
Get full text
Thesis -
12
Cyberbullying in e-learning platform: an exploratory study through text mining analytics
Published 2019“…This paper also aimed to propose a practical solution to combat cyberbullying in an educational platform, and shed some lights on the potential applications of text mining techniques in educational research.…”
Get full text
Get full text
Get full text
Article -
13
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Predictive crime mapping model using association rule mining for crime analysis
Published 2014“…After training the data, the rules of relationship between attributes were generated. Here, the technique of association rule mining is being used. …”
Get full text
Get full text
Article -
16
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Recently, among the challenges of Human Resource professionals has been managing an organization talent which involves a lot of managerial or human decisions, which sometimes are very uncertain and difficult. Prediction in data mining is among the popular machine learning techniques as a part of intelligent techniques, for example, Bayesian methods, neural network, support vector machine, association rule mining, k-nearest-neighbor, rough sets and fuzzy logic. …”
Get full text
Get full text
Research Reports -
17
Menyemak Jawapan Soalan Subjektif Menggunakan Pendekatan Pemprosesan Bahasa Tabii
Published 2006“…The learning system in this study utilizes the natural language processing technique in order to receive subjective answers from the users. …”
Get full text
Get full text
Get full text
Thesis -
18
Unsupervised logic mining with a binary clonal selection algorithm in multi-unit discrete Hopfield neural networks via weighted systematic 2 satisfiability
Published 2024“…Additionally, unsupervised learning techniques such as Topological Data Analysis were proposed to ensure the reliability of the selected attributes in the model. …”
Get full text
Get full text
Get full text
Article -
19
Prediction of Corrosion in Pipeline by using Deep Learning
Published 2020“…In addition, the accuracy of data will be validated by using the Cross-Validation technique in order to choose the lowest RMSE and best suited of LSTM model. …”
Get full text
Get full text
Final Year Project -
20
Optimization and design of machine learning computational technique for prediction of physical separation process
Published 2022“…Indeed, this work indicates application of machine learning technique for a real physical system and optimization of process parameters to achieve the target. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
