Search Results - solution ((validation technique) OR (mining techniques))

Refine Results
  1. 1

    Application of data mining on polynomial based approach for ECG biometric by Sidek, Khairul Azami, Khalil, Ibrahim

    Published 2011
    “…QRS complexes from each dataset was divided into two parts, the training and the testing dataset which was used to prove the validity of the data mining technique applied. Experimental results was classified using Multilayer Perceptron (MLP) in order to confirm the identity of an individual and was compared with the previous research using polynomials without the use of data mining technique. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar by Almalawi, A., Khan, A.I., Alqurashi, F., Abushark, Y.B., Alam, M.M., Qaiyum, S.

    Published 2022
    “…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
    Get full text
    Get full text
    Article
  3. 3

    Modeling of Remora Optimization with Deep Learning Enabled Heavy Metal Sorption Efficiency Prediction onto Biochar by Almalawi, A., Khan, A.I., Alqurashi, F., Abushark, Y.B., Alam, M.M., Qaiyum, S.

    Published 2022
    “…Besides, deep belief network (DBN) model was employed for prediction and the efficiency of the DBN model is optimally adjusted with utilize of RO technique. The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods The experimental validation of the RODL-HMSEP technique ensured the promising performance of the RODL-HMSEP technique on the prediction of sorption efficiency onto biochar over other methods. …”
    Get full text
    Get full text
    Article
  4. 4

    Modelling reservoir water release decision using temporal data mining and neural network by Wan Ishak, Wan Hussain, Ku-Mahamud, Ku Ruhana, Md Norwawi, Norita

    Published 2012
    “…These experiences provide valuable information on the decision when the reservoir water should be released. Temporal data mining technique has been applied to extract temporal pattern from the reservoir operational record and neural network has been applied as the modeling tool. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A review on optimization of least squares support vector machine for time series forecasting by Yusof, Yuhanis, Mustaffa, Zuriani

    Published 2016
    “…This paper presents a review on techniques used to optimize the parameters based on two main classes; Evolutionary Computation and Cross Validation.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Analysis of traffic accidents using association rules mining technique / Abdullah Murshid Abdul Rahim by Abdul Rahim, Abdullah Murshid

    Published 2022
    “…Analysis of traffic accidents using data mining techniques is a project to identify the traffic accident pattern analysis using data mining techniques. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…Medical Diagnosis Using Data Mining Techniques is a system in specifically facilitates the data mining techniques in predicting the appropriate drug prescription of certain condition of patients. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Bioleaching and biosorption of heavy metals from gold mine tailings by Aspergillus fumigatus in Penjom, Malaysia by Jalili Seh Bardan, Bahi

    Published 2012
    “…The ability of A. fumigatus to remove As, Fe, Mn, Pb and Zn from synthetic solutions and from leachate derived from gold mine during bioleaching was assessed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks by Farah Liyana, Azizan, Saratha, Sathasivam, Majid Khan, Majahar Ali, Nurshazneem, Roslan, Caicai, Feng

    Published 2023
    “…The suggested network’s performance was trained and validated using Matlab 2020b. The hybrid techniques significantly obtain better results in terms of error analysis, efficiency evaluation, energy analysis, similarity index, and computational time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih by Ahmed Abuluaih, Saajid Akram

    Published 2019
    “…Therefore, most of the recent research in the field is devoted to improving the problem solvers that utilize search strategies and techniques. Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Text mining in bioinformatics: past, present and future by Faiiazee, Hadee, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abdullah, Rusli, Samsudin, Khairulmizam

    Published 2012
    “…Dealing with this situation needs to deploy innovative methods and techniques. In this paper, we identify the current heavily used methods for biomedical text mining, their capabilities and developments, some proposed solution and how to evaluate performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach by Azmi, Abu Bakar

    Published 2011
    “…In this study the data extracted is clustered using two different types of data mining techniques i.e. K-Means and Kohonen Network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  14. 14

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Review of firewall optimization techniques by Shakirah, Saidin, Mohamad Fadli, Zolkipli

    Published 2018
    “…Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Accelerated mine blast algorithm for ANFIS training for solving classification problems by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
    Get full text
    Get full text
    Article
  17. 17

    Predictive crime mapping model using association rule mining for crime analysis by Asmai, S. A., Rosmiza Wahida, Abdullah, Sabrina, Ahmad

    Published 2014
    “…After training the data, the rules of relationship between attributes were generated. Here, the technique of association rule mining is being used. …”
    Get full text
    Get full text
    Article
  18. 18

    Intrusion detection system with data mining approach: a review by Khalilian, Majdid, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. The main problem in intrusion detection system is accuracy to detect new attacks therefore unsupervised methods should be applied. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Text mining in mosquito-borne disease: A systematic review by Ong, Song Quan, Maisarah Mohamed Pauzi, Keng, Hoon Gan

    Published 2022
    “…In this review, we survey the recent works in the text mining techniques used in combating mosquito-borne diseases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan by Mohamed Isa, Zuraidah, Ibrahim, Dahlia, Abu Hassan, Mohamad Hanif

    Published 2022
    “…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
    Get full text
    Get full text
    Book Section