Search Results - (( based operations mining algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An application of IPA approach on the optimization of a mining port stockyard system by Ayu, Media Anugerah, Cardew-Hall, Michael

    Published 2002
    “…In this research a stockyard system of a mining operation was analyzed using backward analysis. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.] by Hashad, Alaa Amin, Khaw, Khai Wah, Alnoor, Alhamzah, Chew, Xin Ying

    Published 2024
    “…The proposed method is based on comparing two algorithms: Apriori and Frequent Pattern Growth (FP- Growth). …”
    Get full text
    Get full text
    Article
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  7. 7
  8. 8
  9. 9

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…Based on the experiment results, the classification method using the TIP approach has successfully performed rules generation and classification tasks as required during a classification operation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
    Get full text
    Get full text
    Article
  13. 13

    Mining sequence of event from vector-based spatiotemporal database by B.Y., Widodo

    Published 2007
    “…In this paper, we propose VectoFlowMiner, an extension to FlowMiner, a spatiotemporal data mining algorithm. FlowMiner, are targeted for mining from raster-based spatial data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  15. 15
  16. 16

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…The second component is the search process that is operated by a pattern matching. The third process is the parsing that is operated by a text mining algorithm. …”
    Article
  17. 17
  18. 18

    Adaptive firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim

    Published 2016
    “…In order to refine the obtained clusters, a second algorithm, termed as Weight-based Firefly Algorithm with Relocate (WFAR), is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Novel rule base development from IED-resident big data for protective relay analysis expert system by Othman, Mohammad Lutfi, Aris, Ishak, Ananthapadmanabha, Thammaiah

    Published 2016
    “…Thus, the objective of this chapter is to study the design of an Expert System called ProtectiveRelay Analysis System (PRAY), which is imbedded with a rule base construction module. This module is to provide the facility of intelligently maintaining the knowledge base of PRAY through the prior discovery of relay operations (association) rules from a novel integrated data mining approach of Rough-Set-Genetic-Algorithm-based rule discovery and Rule Quality Measure. …”
    Get full text
    Get full text
    Book Section
  20. 20