Search Results - (( does generation mining algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- generation mining »
- implication based »
- mining algorithm »
- java implication »
- does generation »
-
1
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…Most TC algorithms used terms in representing the document which does not consider the relations among the terms. …”
Get full text
Get full text
Get full text
Thesis -
2
Assessing the relationship between pollution sources and water quality parameters of Sungai Langat Basin using association rule mining
Published 2020“…Both data are combined and pre-processed through association rule mining for further modelling processes. Apriori algorithm was used to generate rules in finding any relationships between sources of pollution and water quality parameters. …”
Get full text
Get full text
Get full text
Article -
3
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
4
Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi
Published 2013“…Time-series clustering is not only useful as an exploratory technique but also as a subroutine in more complex data mining algorithms. As a result, time-series clustering (as a part of temporal data mining research) has attracted increasing interest for use in various areas such as medicine, biology, finance, economics, and in the Web. …”
Get full text
Get full text
Thesis -
5
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
6
-
7
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
Get full text
Get full text
Thesis -
8
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The clustering algorithm consists of two components: the temporal micro-clusters generation and the temporal micro clusters merging. …”
Get full text
Get full text
Thesis -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
