Search Results - (( development communication mining algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…However, nowadays, short-form word has been widely used by many people, especially in online communication. These short-form words trigger problems in the field of data mining, especially those involving online text processing. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail by Azilawati Azizan, Azilawati Azizan, NurAine Saidin, NurAine Saidin, Nurkhairizan Khairudin, Nurkhairizan Khairudin, Rohana Ismail, Rohana Ismail

    Published 2020
    “…However, nowadays, short-form word has been widely used by many people, especially in online communication. These short-form words trigger problems in the field of data mining, especially those involving online text processing. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…The third process is the parsing that is operated by a text mining algorithm. The last part is the storage that is managed by Monitor Agent. …”
    Article
  9. 9
  10. 10
  11. 11

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…This thesis addresses SMS Spam and Phishing attack detection framework development. 3 modules can be found in this framework, of which are Data Collection, Attack Profiling and Text Mining respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The ADR schemes also presented high computational time due to communication channel breakdown, latency, and susceptibility to the cyberattack since the communication channel is used for the trip command transmission and considering the high cost of communication medium. …”
    Get full text
    Get full text
    Thesis