Search Results - (( developing rules clustering algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Computational Discovery of Motifs Using Hierarchical Clustering Techniques by Wang, Dianhui, Lee, Nung Kion

    Published 2008
    “…A mismatch based hierarchical clustering algorithm is proposed in this paper, where three heuristic rules for classifying clusters and a post-processing for ranking and refining the clusters are employed in the algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  3. 3

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The production of clustering are used to build rules.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The production of clustering are used to build rules.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase by Che Mat @ Mohd Shukor, Zamzarina, Md Sap, Mohd Noor

    Published 2004
    “…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…A modified apriori algorithm was employed to reduce the number of clusters effectively on the basis of common data in the clusters of every input to obtain a minimal set of decision rules based on datasets. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  9. 9

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…Clustering problem is discussed as a problem of non-smooth, non-convex optimization and a new method for solving this optimization problem is developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…We classify the cluster group that exceeds the stopping rule as potential outliers. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering by Rashed, Alwatben Batoul

    Published 2022
    “…Moreover, interpretability also recorded better results on testing problems, where most of the number of rules were fewer than 33. A clustering algorithm based on MOPSO-CD with a modified archive update mechanism (MCPSO-CD) was used to estimate the optimal number of clusters. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…The selected subset of genes is then be used to train the classifiers for constructing rules for future tissue classification problem. Various k-means clustering algorithms and model-based clustering algorithms are proposed to group the genes. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…Othman proposed a clustering algorithm named BTreeBicluster. The BTreeBicluster starts with the development of GO tree and enriching it with expression similarity from the Sacchromyces genes. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Using Markov Model and Association Rules for Web Access Prediction by Siriporn, Chimphlee, Salim, Naomie, Ngadiman, Mohd. Salihin, Witcha, Chimphlee

    Published 2006
    “…In this paper, we propose a method for constructing first-order and second-order Markov models of Web site access prediction based on past visitor behavior and compare it association rules technique. This algorithm has been used to cluster similar transition behaviors for efficient used to further improve the efficiency of prediction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Penggunaan penggugusan subtraktif bagi menjana peraturan kabur by Priyono, Agus, Ridwan, Purnomo, Alias, Ahmad Jais, Rahmat, Riza Atiq, Hassan, Azmi, Mohd Ali, Mohd Alaudin

    Published 2005
    “…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…Since the sensors have the characteristics of self-organizing and low cost and the wireless sensor network develops rapidly, more reliable routing algorithms are required to perform better forwarding. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An Improved Fuzzy Parallel Distributed –Like Controller for Multi-Input Multi-Output Twin Rotor System by Mahmoud, Thair Sh.

    Published 2009
    “…For future works, it is recommended to develop an optimization algorithm which achieves best selection for the range of influence which gives best response with less number of rules.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis