• Nenhum resultado encontrado

[PDF] Top 20 An optimization-based wrapper approach for utility-based data mining

Has 10000 "An optimization-based wrapper approach for utility-based data mining" found on our website. Below are the top 20 most common "An optimization-based wrapper approach for utility-based data mining".

An optimization-based wrapper approach for utility-based data mining

An optimization-based wrapper approach for utility-based data mining

... better utility value. This behavior is expected as the second approach makes a more extensive search than the first ...Moreover, Approach II was developed to fix some limitations of Approach ... See full document

89

Spatio-temporal data mining in palaeogeographic data with a density-based clustering algorithm

Spatio-temporal data mining in palaeogeographic data with a density-based clustering algorithm

... large data set may lead to biased ...problems. An alternative for optimization could be to consider a Map Reduce or similar technique to handle Big Data, seeking for more efficiency in the ... See full document

103

AN IMPROVED TEACHING-LEARNING BASED OPTIMIZATION APPROACH FOR FUZZY CLUSTERING

AN IMPROVED TEACHING-LEARNING BASED OPTIMIZATION APPROACH FOR FUZZY CLUSTERING

... is an important problem in data mining and knowledge ...for data in K cluster is the distance between data and their cluster center ...m data samples, , where each in the ... See full document

8

A divide-and-conquer strategy using feature relevance and expert knowledge for enhancing a data mining approach to bank telemarketing

A divide-and-conquer strategy using feature relevance and expert knowledge for enhancing a data mining approach to bank telemarketing

... As an example, Lin et ...a wrapper-based ...mixed approach, which brings a new research contribution by using computed feature relevance combined with an expert ... See full document

31

Wave-equation based traveltime seismic tomography – Part 1: Method

Wave-equation based traveltime seismic tomography – Part 1: Method

... Tromp et al., 2005; Tape et al., 2009; Zhu et al., 2012), WETST can be viewed as a “2- D-3-D” adjoint tomography technique. From the computation point of view, 2-D forward modelling with a high-order central difference ... See full document

44

An Effective Data Transformation Approach for Privacy Preserving Clustering

An Effective Data Transformation Approach for Privacy Preserving Clustering

... preserving data mining emerged due to the recent advances in data mining, Internet and security ...technologies. Data sharing among organizations considered to be useful which offer ... See full document

7

Tuning of a Proportional-Integral-Derivative Controller using Multi-Objective Non Dominated Sorting Particle Swarm Optimization Applied to pH Control in Continuous Stirred Tank Reactor

Tuning of a Proportional-Integral-Derivative Controller using Multi-Objective Non Dominated Sorting Particle Swarm Optimization Applied to pH Control in Continuous Stirred Tank Reactor

... in an acid-base titration process is a challenging ...as an important benchmark for control of highly non linear processes. At an earlier stage, pH Control was done using linear conventional ... See full document

6

Distributed RSS-Based Localization in Wireless Sensor Networks Based on Second-Order Cone Programming

Distributed RSS-Based Localization in Wireless Sensor Networks Based on Second-Order Cone Programming

... making an additional step of the length δ (k) i in the first iteration pushes the estimates much closer to the true target ...our approach will converge under all conditions, our simulation results show ... See full document

23

Association Rule Mining for Both Frequent and Infrequent Items Using Particle Swarm Optimization Algorithm

Association Rule Mining for Both Frequent and Infrequent Items Using Particle Swarm Optimization Algorithm

... In Figure 5, the nodes within the positive boundary area have a minimum support value which is 30%. This proposed method searches frequent nodes within a positive area and try to converge to a solution: finding all the ... See full document

11

A P2P Botnet Virus Detection System Based on Data-Mining Algorithms

A P2P Botnet Virus Detection System Based on Data-Mining Algorithms

... system based on data-mining algorithms is proposed in this study to detect the infected computers quickly using Bayes Classifier and Neural Network (NN) ... See full document

15

Cross-SAGE: SAGE Data Mining Tool Based on Set Theory

Cross-SAGE: SAGE Data Mining Tool Based on Set Theory

... of an analysis function. For example, a web-based analysis platform of SAGE called SAGEmap is located in NCBI, which was proposed by ...SAGE data of biological samples for downloading, but also ... See full document

6

Development of web-based tools for spectral data analysis and mining

Development of web-based tools for spectral data analysis and mining

... organizing data objects into a set of typically non overlapping flat groups, by typically using iterative algorithms that optimize a chosen ...clustering. An algorithm for this approach starts from a ... See full document

125

Development of web-based tools for metabolomics data analysis and mining

Development of web-based tools for metabolomics data analysis and mining

... Banana peels are well recognized as a source of important bioactive compounds, such as phenolics, carotenoids, biogenic amines, among others. As such, they have recently started to be used for industrial purposes. ... See full document

109

Comparison of Different Control Strategies in GA-Based Optimized UPFC Controller in Electric Power Systems

Comparison of Different Control Strategies in GA-Based Optimized UPFC Controller in Electric Power Systems

... tuned based on classical or trial-and-error approaches, they are incapable of obtaining a good dynamic performance for a wide range of operation ...research an optimization approach, ... See full document

8

DATA MINING TECHNIQUES FOR SEPARATION OF SUMMER CROP BASED ON SATELLITE IMAGES

DATA MINING TECHNIQUES FOR SEPARATION OF SUMMER CROP BASED ON SATELLITE IMAGES

... ABSTRACT: Due to the difficulty in discriminating soybean and corn in mappings obtained by the time series of satellite images, this study aimed to apply the data mining techniques to separate soybean and ... See full document

10

Research on Personalized Recommendation in E-commerce Service based on Data Mining

Research on Personalized Recommendation in E-commerce Service based on Data Mining

... limitations: Data sparsity and scalability. On one hand, similar values are based on a common project, so they are unreliable when data are sparse and the common ite ms are ...Our approach has ... See full document

5

RSECM: Robust Search Engine using Context-based Mining for Educational Big Data

RSECM: Robust Search Engine using Context-based Mining for Educational Big Data

... is based on ...relevant data for analytics (includes Principal Component Analysis (PCA), Dictionary Learning (DL) and Compressive Sampling ...In an educational system, the queries submitted by the ... See full document

13

An Ontology Based Approach for Automatically Annotating Document Segments

An Ontology Based Approach for Automatically Annotating Document Segments

... in an ontology or a thesaurus, without the existence of all its possible ...extend an existing ontology as it means that if the system does not recognize that the entity being added is a synonym to ... See full document

10

A framework for supporting knowledge representation – An ontological based approach

A framework for supporting knowledge representation – An ontological based approach

... extract data from a project’s knowledge source, like databases and knowledge source repositories, mining over text and data to build a statistic representation of available knowledge ...module, ... See full document

122

Seismic Hazard Prediction Using Seismic Bumps: A Data Mining Approach

Seismic Hazard Prediction Using Seismic Bumps: A Data Mining Approach

... In this study, ELM method is used in the modeling stage of the data mining. ELM which is proposed by Huang et al., is a learning algorithm developed for a feedforward neural network with one hidden layer ... See full document

6

Show all 10000 documents...