Search Results - (( java implementation modified algorithm ) OR ( causing process mining algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- mining algorithm »
- causing process »
- process mining »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease
Published 2019“…This disease is not epidemic but it re-mains the single most common cause of death. This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. …”
Get full text
Get full text
Conference or Workshop Item -
4
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
Published 2019“…With the increased interest into data mining as an important tool for data processing and analysis, the researchers are concerned into data mining for real decision making, data mining helps in the organizational decision making, inaccurate information can mislead decisionmakers and cause costly errors. …”
Get full text
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
7
Analysis of Feature Selection Methods for Sentiment Analysis Concerning Covid-19 Vaccination Issues
Published 2023“…Sentiment analysis is one of the most active research areas in natural language processing, data mining, information retrieval, and web mining. …”
Get full text
Get full text
Get full text
Article -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
9
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…In addition, exponential growth of data causes high computational costs in Apriori-like algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Identifying significant features and data mining techniques in predicting cardiovascular disease / Mohammad Shafenoor Amin
Published 2018“…Researchers have often focused towards the diagnosis by using different algorithms, sometimes even using the hybrid algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Automatic clustering of gene ontology by genetic algorithm
Published 2006“…However, the increase in size of the Gene Ontology has caused problems in maintaining and processing them. …”
Get full text
Get full text
Article -
12
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
Get full text
Get full text
Thesis -
13
Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction
Published 2024“…This assists medical practitioners to detect a disease at early stage especially diabetes that causes further health complications. The diversity and availability of healthcare datasets supports medical practitioners to use computer applications in the diagnosis process. …”
Get full text
Get full text
Get full text
Article -
14
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Based on the trend shows more activities done during the holiday and the attacking activity also frequently happen during the weekend or public holiday. Data mining process lead to reveal the information gather for profiling purposes and identify type of traffic passing through the BSIS network. …”
Get full text
Get full text
Thesis -
15
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…Experimental results are compared with other alternative online/offline hybrid density-based clustering algorithms. The average processing time for data point in the data stream is about 2 milliseconds which is much lower than the aligned clustering algorithms in literature. …”
Get full text
Get full text
Thesis -
16
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
Ideal combination feature selection model for classification problem based on bio-inspired approach
Published 2020“…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
Get full text
Get full text
Book Section -
19
-
20
A Predictive Classification Model For Running Injury
Published 2022“…The J48, SMO, Random Forest, and Simple Logistic algorithms were used for 10-fold cross validation mode classification benchmarked on the ZeroR baseline algorithm. …”
Get full text
Get full text
Monograph
