Search Results - solution ((validation technique) OR (mining techniques))
Search alternatives:
- validation technique »
- mining techniques »
-
1
Application of data mining on polynomial based approach for ECG biometric
Published 2011“…QRS complexes from each dataset was divided into two parts, the training and the testing dataset which was used to prove the validity of the data mining technique applied. Experimental results was classified using Multilayer Perceptron (MLP) in order to confirm the identity of an individual and was compared with the previous research using polynomials without the use of data mining technique. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar
Published 2022“…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
Get full text
Get full text
Article -
3
Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar
Published 2022“…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
Get full text
Get full text
Article -
4
Modelling reservoir water release decision using temporal data mining and neural network
Published 2012“…These experiences provide valuable information on the decision when the reservoir water should be released. Temporal data mining technique has been applied to extract temporal pattern from the reservoir operational record and neural network has been applied as the modeling tool. …”
Get full text
Get full text
Get full text
Article -
5
A review on optimization of least squares support vector machine for time series forecasting
Published 2016“…This paper presents a review on techniques used to optimize the parameters based on two main classes; Evolutionary Computation and Cross Validation.…”
Get full text
Get full text
Get full text
Article -
6
Analysis of traffic accidents using association rules mining technique / Abdullah Murshid Abdul Rahim
Published 2022“…Analysis of traffic accidents using data mining techniques is a project to identify the traffic accident pattern analysis using data mining techniques. …”
Get full text
Get full text
Thesis -
7
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Medical Diagnosis Using Data Mining Techniques is a system in specifically facilitates the data mining techniques in predicting the appropriate drug prescription of certain condition of patients. …”
Get full text
Get full text
Thesis -
8
Bioleaching and biosorption of heavy metals from gold mine tailings by Aspergillus fumigatus in Penjom, Malaysia
Published 2012“…The ability of A. fumigatus to remove As, Fe, Mn, Pb and Zn from synthetic solutions and from leachate derived from gold mine during bioleaching was assessed. …”
Get full text
Get full text
Thesis -
9
Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks
Published 2023“…The suggested network’s performance was trained and validated using Matlab 2020b. The hybrid techniques significantly obtain better results in terms of error analysis, efficiency evaluation, energy analysis, similarity index, and computational time. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…Therefore, most of the recent research in the field is devoted to improving the problem solvers that utilize search strategies and techniques. Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
Get full text
Get full text
Thesis -
11
Text mining in bioinformatics: past, present and future
Published 2012“…Dealing with this situation needs to deploy innovative methods and techniques. In this paper, we identify the current heavily used methods for biomedical text mining, their capabilities and developments, some proposed solution and how to evaluate performance. …”
Get full text
Get full text
Conference or Workshop Item -
12
Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach
Published 2011“…In this study the data extracted is clustered using two different types of data mining techniques i.e. K-Means and Kohonen Network. …”
Get full text
Get full text
Get full text
Thesis -
13
A numerical method for frequent pattern mining
Published 2009“…Frequent pattern mining is one of the active research themes in data mining. …”
Get full text
Get full text
Article -
14
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
15
Review of firewall optimization techniques
Published 2018“…Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
Get full text
Get full text
Article -
17
Predictive crime mapping model using association rule mining for crime analysis
Published 2014“…After training the data, the rules of relationship between attributes were generated. Here, the technique of association rule mining is being used. …”
Get full text
Get full text
Article -
18
Intrusion detection system with data mining approach: a review
Published 2011“…Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. The main problem in intrusion detection system is accuracy to detect new attacks therefore unsupervised methods should be applied. …”
Get full text
Get full text
Get full text
Article -
19
Text mining in mosquito-borne disease: A systematic review
Published 2022“…In this review, we survey the recent works in the text mining techniques used in combating mosquito-borne diseases. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan
Published 2022“…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
Get full text
Get full text
Book Section
