Search Results - (( based control mining algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- mining algorithm »
- java implication »
- control mining »
-
1
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
2
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…Based on the findings, the proposed logic mining model outperformed other baseline logic mining models for all the performance metrics used in the repository dataset. …”
Get full text
Get full text
Thesis -
3
-
4
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. The major objective of the proposed technique referred to as a Secure Web Access Control (SWAC) is to provide mechanisms for control web access based on user access behavior. …”
Get full text
Get full text
Thesis -
5
A novel approach to data mining using simplified swarm optimization
Published 2011“…This deficiency has prompted the need for a new intelligent data mining technique based on stochastic population-based optimization that could discover useful information from data. …”
Get full text
Get full text
Thesis -
6
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
7
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…The increasing size of data being stored have created the need for computer-based methods for automatic data analysis. Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
8
-
9
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
Get full text
Get full text
Monograph -
10
-
11
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Both data acquisition and control algorithm are developed by using LabVIEW. …”
Get full text
Get full text
Thesis -
12
Application of data mining techniques for economic evaluation of air pollution impact and control
Published 2007“…In addition, if any country wants to reduce the urban SO2 concentration, more works can be conducted on controlling corruption index than controlling SO2 emission per populated area.…”
Get full text
Get full text
Thesis -
13
-
14
CNC Cutting Tools` Life Prediction Using Data Mining Approach
Published 2022“…In this paper, classification is chosen to be the data mining approach with two algorithms to build the model for prediction, which are linear regression and multilayer perceptron. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang
Published 2019“…Technical evaluation of performance reliability of six gene signature similarity scoring algorithms showed that the Weighted Connectivity Score or the statistically significant Connectivity Map, are prime candidates for upgrading the current core algorithm of DeSigN, which is based on the Kolmogorov-Smirnov statistic. …”
Get full text
Get full text
Thesis -
16
-
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
18
Understanding the occurrence of metastatic breast cancer through clinical, phenotype and genotype data, and the employment of machine learning / Nadia Jalaludin
Published 2023“…For objective (b), prediction model was generated based on the outcome of (a) by using the Random Forest (RF) algorithm and validated by 5-fold cross validation. …”
Get full text
Get full text
Thesis -
19
-
20
Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart...
Published 2023“…This problem has motivated academia and industry to develop frameworks for cyber parental control. Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
Get full text
Get full text
Get full text
Thesis
