Search Results - (( java implementation mining algorithm ) OR ( pattern detection context algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Anomaly detection through spatio-temporal context modeling in crowded scenes by Lu, T., Wu, L., Ma, X., Shivakumara, P., Tan, C.L.

    Published 2014
    “…The proposed framework essentially turns the anomaly detection process into two parts, namely, motion pattern representation and crowded context modeling. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
    Get full text
    Get full text
    Article
  10. 10

    An adaptive anomaly threshold in artificial dendrite cell algorithm by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2017
    “…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An improved artificial dendrite cell algorithm for abnormal signal detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Toward heterogeneous computing to facilitate sequential OLAP real-time applications by Hameed, Shihab A., Habaebi, Mohamed Hadi, Alzeini, Haytham I. M.

    Published 2016
    “…The optimized algorithm is dedicated to detect patterns over parallel data streams in Real-Time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs) by Baashar Y., Alkawsi G., Mustafa A., Alkahtani A.A., Alsariera Y.A., Ali A.Q., Hashim W., Tiong S.K.

    Published 2023
    “…This study also attempts to capture a pattern of the most used ANN techniques and algorithms. …”
    Article
  16. 16

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…Detecting healthy crops using Python in the context of an analysis project has emerged as an approach that speeds up a process to find out the current state of crops. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Analyzing UiTMCTKKT vehicle utilization and travel pattern using predictive analytics by Syed Mohamad, Sharifah Masyitah

    Published 2025
    “…This indicates its strong ability to model temporal and operational patterns in the dataset accurately. The dashboard enabled users to trace mileage, detect underused vehicles, and identify periods suitable for vehicle maintenance. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Wifi-based location-independent human activity recognition and localization using deep learning by Abuhoureyah, Fahd Saad Amed

    Published 2024
    “…Second, Multi-head Attention Mechanism Networks capture intricate patterns in Channel State Information (CSI) data, enhancing recognition accuracy for human activities detected through WiFi signals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living by Hamza, Manar Ahmed, Hassan Abdalla Hashim, Aisha, Motwakel, Abdelwahed, Elhameed, Elmouez Samir Abd, Osman, Mohammed, Kumar, Arun, Singla, Chinu, Munjal, Muskaan

    Published 2024
    “…DL techniques like recurrent neural network (RNN) or transformer- based frameworks like BERT are used to mechanically learn difficult linguistic patterns and contextual info from tweet data. These techniques able to capture subtleties of language with sarcasm, sentiment, and context-specific meanings and making them suitable for tasks like sentiment analysis or topic classification in realm of social media. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article