Search Results - (( data optimization mining algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    Evaluation of data mining models for predicting concrete strength by Wong, Chuan Ming

    Published 2024
    “…Data mining techniques are becoming more popular in recent years due to their abilities to predict any types of data with high accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…In addition, the tree-based method is extended to mine contrast subspaces of query object in categorical data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry by Ma, Yuaner, Jabar, Juhaini, Abdul Aziz, Nor Azah

    Published 2023
    “…This study proposes an integrated approach that combines feature selection with Gaussian Seahorse Optimization Data Mining (GSH-DM) to identify the most relevant features and optimize the data mining process. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…Main resources, server log files become a set of raw data where it's must go through with all the Web usage mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E-Learning portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…Data mining can discover patterns or rules from a vast volume of data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Optimizing Tree-Based Contrast Subspace Mining Using Genetic Algorithm by Sia, Florence Fui Sze, Rayner Alfred

    Published 2022
    “…Recently, tree-based contrast subspace mining method has been introduced to find contrast subspace in numerical data set effectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A novel approach to data mining using simplified swarm optimization by Wahid, Noorhaniza

    Published 2011
    “…This deficiency has prompted the need for a new intelligent data mining technique based on stochastic population-based optimization that could discover useful information from data. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Article
  18. 18

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Article
  19. 19

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20