Particle swarm optimization: A comprehensive survey

TM Shami, AA El-Saleh, M Alswaitti, Q Al-Tashi… - Ieee …, 2022 - ieeexplore.ieee.org
Particle swarm optimization (PSO) is one of the most well-regarded swarm-based algorithms
in the literature. Although the original PSO has shown good optimization performance, it still …

Human emotion recognition from EEG-based brain–computer interface using machine learning: a comprehensive review

EH Houssein, A Hammad, AA Ali - Neural Computing and Applications, 2022 - Springer
Affective computing, a subcategory of artificial intelligence, detects, processes, interprets,
and mimics human emotions. Thanks to the continued advancement of portable non …

Predicting academic success in higher education: literature review and best practices

E Alyahyan, D Düştegör - … Journal of Educational Technology in Higher …, 2020 - Springer
Student success plays a vital role in educational institutions, as it is often used as a metric for
the institution's performance. Early detection of students at risk, along with preventive …

Feature selection in machine learning: A new perspective

J Cai, J Luo, S Wang, S Yang - Neurocomputing, 2018 - Elsevier
High-dimensional data analysis is a challenge for researchers and engineers in the fields of
machine learning and data mining. Feature selection provides an effective way to solve this …

[HTML][HTML] Relief-based feature selection: Introduction and review

RJ Urbanowicz, M Meeker, W La Cava… - Journal of biomedical …, 2018 - Elsevier
Feature selection plays a critical role in biomedical data mining, driven by increasing feature
dimensionality in target problems and growing interest in advanced but computationally …

[PDF][PDF] 特征选择方法综述

姚旭, 王晓丹, 张玉玺, 权文 - 控制与决策, 2012 - faculty.csu.edu.cn
特征选择方法综述 Page 1 第27 卷第2 期 Vol. 27 No. 2 控制与决策 Control and Decision
2012 年2 月 Feb. 2012 特征选择方法综述 文章编号: 1001-0920 (2012) 02-0161-06 姚旭 …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

Landslide susceptibility mapping using J48 Decision Tree with AdaBoost, Bagging and Rotation Forest ensembles in the Guangchang area (China)

H Hong, J Liu, DT Bui, B Pradhan, TD Acharya… - Catena, 2018 - Elsevier
Landslides are a manifestation of slope instability causing different kinds of damage
affecting life and property. Therefore, high-performance-based landslide prediction models …

Hybrid integration of Multilayer Perceptron Neural Networks and machine learning ensembles for landslide susceptibility assessment at Himalayan area (India) using …

BT Pham, DT Bui, I Prakash, MB Dholakia - Catena, 2017 - Elsevier
The main objective of this study is to evaluate and compare the performance of landslide
models using machine learning ensemble technique for landslide susceptibility assessment …

A novel intrusion detection model for a massive network using convolutional neural networks

K Wu, Z Chen, W Li - Ieee Access, 2018 - ieeexplore.ieee.org
More and more network traffic data have brought great challenge to traditional intrusion
detection system. The detection performance is tightly related to selected features and …