Search Results - (( java implementation models algorithm ) OR ( using rough mining algorithm ))
Search alternatives:
- implementation models »
- java implementation »
- models algorithm »
- mining algorithm »
- rough mining »
- using rough »
-
1
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. …”
Get full text
Get full text
Get full text
Book Chapter -
2
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
3
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
5
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
6
Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree
Published 2010“…This paper addresses these issues by intelligently divulging the knowledge hidden in the relay recorded event report using a data-mining strategy based on rough set theory and a rule-quality measure under supervised learning to discover the relay decision algorithm and association rule. …”
Get full text
Get full text
Get full text
Article -
7
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Rough set-based text mining from a large data repository of experts� diagnoses for power systems
Published 2018“…The algorithms of rough set and statistical t-test are used to distinguish whether a subset can be classified in the object set or not. …”
Get full text
Get full text
Article -
10
Rough set-based text mining from a large data repository of experts� diagnoses for power systems
Published 2018“…The algorithms of rough set and statistical t-test are used to distinguish whether a subset can be classified in the object set or not. …”
Get full text
Get full text
Article -
11
Satisfiable Integer Programming Algorithm On Distributed Inter Process Communication (SIP-DIPC)
Published 2019“…Data Analytics is a superset to Data Mining. Data mining algorithm is getting popular support in recent development of Big Data. …”
Get full text
Get full text
Get full text
Article -
12
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
13
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…Therefore the search for the best rules must be performed because it is not possible to determine the quality of all rules generated from the information systems. In rough set approach to data mining, the set of interesting rules are determined using a notion of reduct. …”
Get full text
Get full text
Thesis -
14
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
15
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
Get full text
Get full text
Get full text
Article -
16
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
18
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
19
A Rough Set-Based Approach for Identifying and Replacing Missing Concepts in Incomplete Sentences in Computer Domain Texts
Published 2026thesis::master thesis -
20
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
Published 2016“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
Get full text
Get full text
Book Chapter
