Search Results - (( developing extractions mining algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- developing extractions »
- implementation level »
- java implementation »
- extractions mining »
- mining algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
Get full text
Get full text
Conference or Workshop Item -
4
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
Get full text
Get full text
Article -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
Get full text
Get full text
Thesis -
7
Direct approach for mining association rules from structured XML data
Published 2012“…Having the ability to extract information from XML data would answer the problem of mining the web contents which is a very useful and required power nowadays. …”
Get full text
Get full text
Thesis -
8
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
9
A new classification model for online predicting users' future movements
Published 2008“…We can exploit Web Usage Mining for Knowledge extracting based on user behavior during the web navigation. …”
Get full text
Get full text
Conference or Workshop Item -
10
Market Basket Analysis for E-Commerce using Association Rule Mining
Published 2020“…The author has developed an ecommerce system which has back-end system to display the performance of the product and using Association Rule Mining on the datasets. …”
Get full text
Get full text
Get full text
Article -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
Get full text
Get full text
Get full text
Thesis -
12
A Comparative Study of FP-growth Variations
Published 2009“…Many algorithms were developed to find those frequent itemsets. …”
Get full text
Get full text
Citation Index Journal -
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
14
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
15
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Association Rule Mining Using Market Basket Analysis
Published 2003“…The results of this analysis can help the retailers to design promotions, arrange shelf or catalogue items and develop cross marketing strategies. To do the analysis, association rules mining is the popular technique for market basket analysis because of their potential in extracting rules between items in transactions. …”
Get full text
Get full text
Get full text
Thesis -
17
Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry
Published 2023“…The cross-border collaboration between the medical industry and the tourism industry has gained significant attention as a promising avenue for economic growth and development. Data mining techniques are employed to extract valuable patterns and insights from large-scale datasets, shedding light on the opportunities and challenges associated with this collaborative effort. …”
Get full text
Get full text
Get full text
Article -
18
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Adding the uncertain class the best accuracy obtained was 98.5% using the SMO algorithm. A predictive classification model that determines the accuracy for three classification classes was developed accordingly using the SMO algorithm.…”
Get full text
Get full text
Monograph -
19
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis
