Search Results - (( java implementation force algorithm ) OR ( using file mining algorithm ))

Refine Results
  1. 1

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The World Wide Web industry generates big and complex data such as web server log files. Many data mining techniques can be used to analyze log files to extract knowledge and valuable information for both organizations and web developers. …”
    Get full text
    Get full text
    Article
  2. 2

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    A log file analysis technique using binary-based approach by Fageeri, S.O., Ahmad, R., Baharudin, B.

    Published 2014
    “…In this research paper, a binary-based approach for mining frequency of data items in database transaction log files is introduced. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Clustering Student Performance Data Using k-Means Algorithms by Sultan Alalawi, Sultan Juma, Mohd Shaharanee, Izwan Nizal, Mohd Jamil, Jastini

    Published 2023
    “…The research approach known as educational data mining (EDM) focuses on using data mining techniques to extract massive data from the educational context and transform it into knowledge that can improve educational systems and decisions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse by Madihah Mohd Saudi, Areej Mustafa Abuzaid, Masrur Ibrahim

    Published 2024
    “…Moreover, the knowledge discovery techniques (KDD) and the data mining algorithm were used to optimize the accuracy result. …”
    Article
  14. 14

    Random sampling method of large-scale graph data classification by Rashed Mustafa, Mohammad Sultan Mahmud, Mahir Shadid

    Published 2024
    “…Finally, we classified the graphs of data blocks using the SVM algorithm. In experimental evaluation, our proposed method outperformed state-of-the-art graph kernels on graph classification datasets in terms of accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A grid enabled E-theses and dissertations repository system by Por, L.Y., Ong, S.Y., Beh, D., Ismail, M.

    Published 2002
    “…For future direction, research will be focused on searching algorithm using data mining or pattern discovery to minimise the respond time.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Using Markov Model and Association Rules for Web Access Prediction by Siriporn, Chimphlee, Salim, Naomie, Ngadiman, Mohd. Salihin, Witcha, Chimphlee

    Published 2006
    “…Mining user patterns of log file can provide significant and useful informative knowledge. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
    Get full text
    Get full text
    Get full text
    Thesis