Search Results - (( java implementation level algorithm ) OR ( pattern using (efficient OR efficiency) algorithm ))

Refine Results
  1. 1

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…During the mining process, the mining algorithm reduces the number of candidate patterns and comparisons by using a new candidate set called candidate head set and several efficient pruning techniques. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…The PC_Miner algorithm traverses the PC_Tree by using an efficient pruning technique. …”
    Get full text
    Get full text
    Article
  4. 4

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new split based searching for exact pattern matching for natural texts by Hakak, Saqib Iqbal, Kamsin, Amirrudin, Shivakumara, Palaiahnakote, Idris, Mohd Yamani Idna, Gilkar, Gulshan Amin

    Published 2018
    “…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
    Get full text
    Get full text
    Article
  6. 6

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Thus far, a few efficient interactive mining algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Most of the previous works explore Apriori approach which is not efficient in mining plentiful and long patterns. In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset by Julaily Aida, Jusoh, Wan Aezwani, Wan Abu Bakar, Mustafa, Man

    Published 2018
    “…An abundant literature has dedicated in frequent pattern mining and tremendous efficient algorithms for frequent itemset mining in the transaction database. …”
    Get full text
    Get full text
    Article
  11. 11

    Fast discovery of long patterns for association rules by Mustapha, N., Sulaiman, M.N., Othman, M., Selamat, M.H.

    Published 2003
    “…An algorithm called Flex for identifying frequent patterns especially efficient when the patterns are long is proposed by successive construction of the nodes lexicographic tree. …”
    Get full text
    Get full text
    Article
  12. 12

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An efficient model for indoor radio signal prediction and coverage estimation / Md. Sumon Sarker by Md. Sumon, Sarker

    Published 2011
    “…In this regards, this study explores two algorithms. The first algorithm is an efficient and faster ray-tracing technique based on binary angle division for radio signal prediction in indoor environment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cuckoo Search Algorithm-Based Zeta Converter In A Photovoltaic System Under Partial Shading Condition by Lourdes, Jotham Jeremy

    Published 2021
    “…To validate the effectiveness of the work, a Cuckoo Search maximum power point tracking model was constructed in MATLAB Simulink using various irradiance patterns for Zeta converter. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improving mining efficiency: A new scheme for extracting association rules by Said, Aiman Moyaid, Dominic, P D D., Abdullah, Azween

    Published 2009
    “…Extracting the association rule from this data is one of the important tasks in data mining.Most of the existing association rules in algorithms typically assume that the data set can fit in the memory.In this paper, we propose a practical and effective scheme to mine association rules from frequent patterns, called Prefixfoldtree scheme (PFT scheme).The original dataset is divided into folds, and then from each fold the frequent patterns are mined by using the tree projection approach.These frequent patterns are combined into one set and finally interestingness constraints are used to extract the association rules.The experiments will be conducted to illustrate the efficiency of our scheme.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Butterfly traffic pattern in selection algorithm on hierarchical torus network by Rahman, M.M. Hafizur, Akhand, M. A. H, Shill, P.C., Inoguchi, Yasushi

    Published 2015
    “…In this paper, we have evaluated the dynamic communication performances of an HTN is evaluated by using dimension-order routing and LS+CS algorithm under butterfly traffic pattern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Fast directional search algorithm for fractional pixel motion estimation for H.264 AVC by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun, Yap, Vooi Voon

    Published 2013
    “…The proposed algorithm employs motion prediction, directional quadrant and point-based search pattern and early termination to speed up the process. …”
    Get full text
    Get full text
    Citation Index Journal
  18. 18
  19. 19

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Therefore, this thesis examines the efficient resource scheduling algorithms to be resistant to the unpredicted transmission order patterns. …”
    Get full text
    Get full text
    Thesis
  20. 20