Search Results - (( java application customization algorithm ) OR ( using communication mining algorithm ))
Search alternatives:
- customization algorithm »
- communication mining »
- using communication »
- java application »
- mining algorithm »
-
1
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…E-mail is used for communication between strangers and friends. …”
Get full text
Get full text
Research Reports -
2
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
5
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
Mining Web usage using FRS
Published 2018Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Web usage mining: A review of recent works
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
12
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
13
Mining Indirect Least Association Rule from Students' Examination Datasets
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…Performance of the BVAGQ-AR technique comprised the following steps. First step is mining the data by using Apriori algorithm from Association Rules. …”
Get full text
Get full text
Thesis -
17
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The third process is the parsing that is operated by a text mining algorithm. The last part is the storage that is managed by Monitor Agent. …”
Article -
19
-
20
Parallel execution of distributed SVM using MPI (CoDLib)
Published 2023“…Message Passing Interface (MPI) is used in the communication between machines in the cluster. …”
Conference paper
