Search Results - (( data interactions mining algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- interactions mining »
- java implementation »
- data interactions »
- mining algorithm »
-
1
Prime-based method for interactive mining of frequent patterns
Published 2010“…Thus far, a few efficient interactive mining algorithms have been proposed. However, their runtime do not fulfill the need of short runtime in real time applications especially where data is sparse and proper frequent patterns are mined with very low values of minsup. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…Although object-based image analysis (OBIA) has been used for detailed classification of urban areas, its attribute selection and knowledge discovery have been time consuming and subjective to analysts' performance. In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
Get full text
Conference or Workshop Item -
4
Comparative study of machine learning algorithms in data classification
Published 2025“…In many different fields, data mining, the process of identifying significant patterns in historical data, is essential to decision-making. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Analysis using data mining techniques: the exploration and review data of diabetes patients / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2025“…In this statistical summary procedure, the distribution of attributes and their interactions are crucial for accurately processing the data in accordance with the selected classification or data mining techniques to be performed. …”
Get full text
Get full text
Get full text
Article -
6
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Research Reports -
7
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
9
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
11
Intelligent mining of large-scale bio-data: bioinformatics applications
Published 2017“…Hence, there is a high potential to raise the interaction between artificial intelligence and bio-data mining. …”
Get full text
Get full text
Get full text
Article -
12
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this technique, the visitor agent is equipped with an algorithm, which detects the potential norms through the system's log file, interactions with the local agents, and observing the local agents in action. …”
Get full text
Conference or Workshop Item -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
14
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Article -
16
A norms mining approach to norms detection in multi-agent systems
Published 2023“…In this technique, the visitor agent is equipped with an algorithm, which detects the potential norms through the system's log file, interactions with the local agents, and observing the local agents in action. …”
Conference paper -
17
Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi
Published 2013“…Various data mining approaches are currently being used to analyse data within different domains. …”
Get full text
Get full text
Thesis -
18
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…Classification and prediction are the functions provided by the data mining techniques that suit in EEG signal processing. …”
Get full text
Get full text
Thesis -
19
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
20
