Search Results - (( java implementation modified algorithm ) OR ( a validation mining algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- validation mining »
- mining algorithm »
- a validation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…This paper has proposed a rough-Apriori based mining technique in mining linguistic association rules focusing on the problem of capturing the numerical interval with linguistic terms in quantitative association rules mining. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…Especially the energy efficiency for the hardware of bitcoin mining were not considered as a problem in bitcoin mining. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…In the context of mining frequent item sets, many methods have been proposed to push various kinds of limitations inside the most well-known algorithms. …”
Get full text
Get full text
Article -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
8
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…Predictive models were also developed by quantifying these models using data mining techniques. A section of the entire geospatial data (70) was used as training datasets, while the remaining part of the data (30) was used to validate the trained datasets. …”
Get full text
Get full text
Article -
9
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
10
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
11
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. …”
Get full text
Get full text
Get full text
Article -
13
Comparison Performance of Qualitative Bankruptcy Classification based on Data Mining Algorithms
Published 2018“…This paper presents a comparison of three different classification algorithms namely NaiveBayes (NaiveBayes classifier), Logistic Regression (Logistic classifier) and C4.5 decision tree (J48 classifier) for bankruptcy classification analysis. …”
Get full text
Get full text
Get full text
Article -
14
Case Slicing Technique for Feature Selection
Published 2004“…One of the problems addressed by machine learning is data classification. Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
15
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Data classifications are performed at a 10-fold-cross-validation mode using Naïve Bayes (NB), Support Vector Machine (SVM), and J48 Trees. …”
Get full text
Get full text
Monograph -
16
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
18
Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique)
Published 2016“…In setting up a new Radiology Centre, the data mining technology specifically image mining is addressed. …”
Get full text
Get full text
Monograph -
19
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…Therefore, this study attempts a data mining approach to the analysis of failure in offline English alphabet recognition. …”
Get full text
Get full text
Monograph -
20
AN AGENT-BASED DOCUMENT CLASSIFICATION MODEL TO IMPROVE THE EFFICIENCY OF THE AUTOMATED SYSTEMATIC REVIEW PROCESS
Published 2023“…Firstly, the document classification algorithm analyses a full text of research articles and evaluates relevancy. …”
Review
