Search Results - (( java implementation modified algorithm ) OR ( causing process mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease by Haruna, A.A., Muhammad, L.J., Yahaya, B.Z., Garba, E.J., Oye, N.D., Jung, L.T.

    Published 2019
    “…This disease is not epidemic but it re-mains the single most common cause of death. This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset by Thamer Khalil, Esmeel, Roslina, Abd Hamid, Rahmah, Mokhtar

    Published 2019
    “…With the increased interest into data mining as an important tool for data processing and analysis, the researchers are concerned into data mining for real decision making, data mining helps in the organizational decision making, inaccurate information can mislead decisionmakers and cause costly errors. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  7. 7

    Analysis of Feature Selection Methods for Sentiment Analysis Concerning Covid-19 Vaccination Issues by Muhammad, Fajar, Tri Basuki, Kurniawan, Edi Surya, Negara Harahap

    Published 2023
    “…Sentiment analysis is one of the most active research areas in natural language processing, data mining, information retrieval, and web mining. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…In addition, exponential growth of data causes high computational costs in Apriori-like algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Identifying significant features and data mining techniques in predicting cardiovascular disease / Mohammad Shafenoor Amin by Mohammad Shafenoor , Amin

    Published 2018
    “…Researchers have often focused towards the diagnosis by using different algorithms, sometimes even using the hybrid algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Automatic clustering of gene ontology by genetic algorithm by Othman, Razib M., Deris, Safaai, Zakaria, Zalmiyah, Illias, Rosli M., Mohamad, Saberi M.

    Published 2006
    “…However, the increase in size of the Gene Ontology has caused problems in maintaining and processing them. …”
    Get full text
    Get full text
    Article
  12. 12

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction by Mohd Aris, Teh Noranis, Abu Bakar, Azuraliza, Mahiddin, Normadiah, Zolkepli, Maslina

    Published 2024
    “…This assists medical practitioners to detect a disease at early stage especially diabetes that causes further health complications. The diversity and availability of healthcare datasets supports medical practitioners to use computer applications in the diagnosis process. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak by Ishak, Rusmawati

    Published 2018
    “…Based on the trend shows more activities done during the holiday and the attacking activity also frequently happen during the weekend or public holiday. Data mining process lead to reveal the information gather for profiling purposes and identify type of traffic passing through the BSIS network. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…Experimental results are compared with other alternative online/offline hybrid density-based clustering algorithms. The average processing time for data point in the data stream is about 2 milliseconds which is much lower than the aligned clustering algorithms in literature. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud, Moamin Ahmed, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mustapha, Aida, Mohd Yusoff, Mohd Zaliman, Abdul Hamid, Nurzeatul Hamimah

    Published 2013
    “…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
    Get full text
    Get full text
    Article
  17. 17

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Ideal combination feature selection model for classification problem based on bio-inspired approach by Basir, Mohammad Aizat, Hussin, Mohamed Saifullah, Yusof, Yuhanis

    Published 2020
    “…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
    Get full text
    Get full text
    Book Section
  19. 19
  20. 20

    A Predictive Classification Model For Running Injury by Ganesan, Devesh Raj

    Published 2022
    “…The J48, SMO, Random Forest, and Simple Logistic algorithms were used for 10-fold cross validation mode classification benchmarked on the ZeroR baseline algorithm. …”
    Get full text
    Get full text
    Monograph