Search Results - (( java implementation bees algorithm ) OR ( using server mining algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…To this end, the proposed execution models were tested with multiple MDSM applications mapping to a real-world use-case for activity detection using MECC systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Using Markov Model and Association Rules for Web Access Prediction by Siriporn, Chimphlee, Salim, Naomie, Ngadiman, Mohd. Salihin, Witcha, Chimphlee

    Published 2006
    “…Mining user patterns of log file can provide significant and useful informative knowledge. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The necessary steps for the proposed technique are identified, and algorithms of these steps are developed and implemented using Active Server Page (ASP) and then tested on two web pages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Predicting next page access by Markov models and association rules on web log data by Chimphlee, S., Salim, N., B. Ngadiman, M. S., Chimphlee, W., Srinoy, S.

    Published 2006
    “…Mining user patterns of log file can provide significant and useful informative knowledge. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…Performance of the BVAGQ-AR technique comprised the following steps. First step is mining the data by using Apriori algorithm from Association Rules. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks by Biju, Issac

    Published 2008
    “…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy by Ahmad Firdaus, Zainal Abidin, Aldharhani, Ghassan Saleh, Zahian, Ismail, Mohd Faizal, Ab Razak

    Published 2022
    “…Cryptojacking is a subset of cybercrime in which hackers use unauthorised devices (computers, smartphones, tablets, and even servers) to mine cryptocurrencies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Blockchain-enabled cybersecurity framework for healthcare domain by Islam, Md Shohidul

    Published 2025
    “…In recent years, health data transactions have usually been done in a traditional way, such as centralised data transactions where an intermediary or third-party server is used. Consequently, daily health data transactions carry the risk of privacy leaks and make data sharing and storage space capability difficulties. …”
    Get full text
    Get full text
    Thesis