Search Results - (( java implementation mining algorithm ) OR ( using network graph algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…The framework has been used to evaluate three graph layout and three graph clustering algorithms on the historical SAGA dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
    Review
  9. 9

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    A hybrid algorithm for finding shortest path in network routing. by Soltan Aghaei, Mohammad Reza, Ahmad Zulkarnain, Zuriati, Mamat, Ali, Zainuddin, Hishamuddin

    Published 2009
    “…This wave gives an O( N ) steps quantum algorithm for identifying that record, where was used classical Dijkstra’s algorithm for finding shortest path problem in the graph of network and implement quantum search. …”
    Get full text
    Article
  11. 11

    A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network by Moudi, Mehrnaz, Othman, Mohamed

    Published 2014
    “…In this paper, we have proposed a new algorithm to minimise the number of conflicts of OMINs using the greedy graph colouring and Zero algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application of computer based simulation in gas network system using graph theory algorithms and numerical methods by Poh, Hong Hwee

    Published 2007
    “…This is causing the other graph theory algorithms remain least known to users. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A comparative study of greedy algorithms and dynamic programming in road network / Nuralya Sofea Hairulanuar by Hairulanuar, Nuralya Sofea

    Published 2024
    “…The research assesses the efficiency, accuracy, and appropriateness of these algorithms for different kinds of networks, with a specific focus on their use in optimizing travel routes within the road network of Terengganu, Malaysia. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A multi-view clustering algorithm for attributed weighted multi-edge directed networks by Khameneh, Azadeh Zahedi, Kilicman, Adem, Mahad, Zahari

    Published 2022
    “…Graph clustering acts as a critical topic for solving decision situations in networks. …”
    Get full text
    Get full text
    Article
  16. 16

    An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm by Harshada Nerkar, Kundu, Prasanta, Chowdhury, Anandita

    Published 2023
    “…The graph theory network gives the idea about the distance between the nodes and it is helpful to find the share of power from the generating sources. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Spanning Tree Transformation of Connected Graph into Single-Row Network by Loh, Ser Lee, Salleh, Shaharuddin, Sarmin, Nor Haniza

    Published 2010
    “…The spanning tree that is produced from the connected graph is then transformed into single-row network using Tree Sequence Modeling (TSM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm by Mr, Handrizal, Mr, Muhammad Zarlis, Noraziah, Ahmad, Abdalla, Ahmed N.

    Published 2012
    “…Graph colouring is a useful algorithm for channel allocation on wireless local area network (WLAN). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20