Search Results - (( developing measures mining algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…Works on sustaining the interestingness of rules generated by data mining algorithms are actively and constantly being examined and developed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System by Hanafi, Suryana, Nanna, Hasan Basari, Abd Samad

    Published 2017
    “…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Advanced data mining techniques for landslide susceptibility mapping by Ibrahim, M.B., Mustaffa, Z., Balogun, A.-L., Hamonangan Harahap, I.S., Ali Khan, M.

    Published 2021
    “…Predictive models were also developed by quantifying these models using data mining techniques. …”
    Get full text
    Get full text
    Article
  12. 12

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An Automated System For Classifying Conference Papers by Ngan, Seon Choon Han

    Published 2021
    “…A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…This research combines the ontology and text representation for classification by developing five algorithms. The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…By incorporating modern data mining techniques, stakeholders can transition from traditional data recapitulation to predictive analytics, enabling proactive measures for public safety. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20