Search Results - (( developing systematic mining algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…The developed logic mining will be used to analyze the Alzheimer's Disease Neuroimaging Initiative dataset.…”
    Get full text
    Get full text
    Thesis
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…Works on sustaining the interestingness of rules generated by data mining algorithms are actively and constantly being examined and developed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Synergizing intelligence and knowledge discovery: Hybrid black hole algorithm for optimizing discrete Hopfield neural network with negative based systematic satisfiability by Rusdi, Nur ‘Afifah, Zamri, Nur Ezlin, Kasihmuddin, Mohd Shareduwan Mohd, Romli, Nurul Atiqah, Manoharam, Gaeithry, Abdeen, Suad, Mansor, Mohd. Asyraf

    Published 2024
    “…Based on the findings, the development of the new systematic SAT and the implementation of the Hybrid Black Hole algorithm to optimize the retrieval capabilities of DHNN to achieve multi-objective functions result in updated final neuron states with high diversity, high attainment of global minima solutions, and produces states with a low similarity index. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
    Get full text
    Get full text
    Article
  17. 17

    Portfolio optimization with percentage error-based fuzzy random data for industrial production by Othman, Mohammad Haris Haikal, Arbaiy, Nureize, Che Lah, Muhammad Shukri, Pei, Chun Lin

    Published 2024
    “…The proposed framework not only acknowledges the importance of data preprocessing but also offers a systematic approach to processing fuzzy random data, thus providing a robust foundation for portfolio selection algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Portfolio optimization with percentage error-based fuzzy random data for industrial production by Othman, Mohammad Haris Haikal, Arbaiy, Nureize, Che Lah, Muhammad Shukri, Lin, Pei-Chun

    Published 2024
    “…The proposed framework not only acknowledges the importance of data preprocessing but also offers a systematic approach to processing fuzzy random data, thus providing a robust foundation for portfolio selection algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis