Search Results - (( java implementation modified algorithm ) OR ( using operations mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An application of IPA approach on the optimization of a mining port stockyard system by Ayu, Media Anugerah, Cardew-Hall, Michael

    Published 2002
    “…In this research a stockyard system of a mining operation was analyzed using backward analysis. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5
  6. 6

    Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.] by Hashad, Alaa Amin, Khaw, Khai Wah, Alnoor, Alhamzah, Chew, Xin Ying

    Published 2024
    “…In the context of mining frequent item sets, many methods have been proposed to push various kinds of limitations inside the most well-known algorithms. …”
    Get full text
    Get full text
    Article
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…With the rapid growth of satellite technology and the increasing of spatial resolution, hyperspectral imaging sensor is frequently used for research and development as well as in some semi-operational scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…Every context requires its own customized text mining algorithms in order to achieve best results. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2010
    “…This paper addresses these issues by intelligently divulging the knowledge hidden in the relay recorded event report using a data-mining strategy based on rough set theory and a rule-quality measure under supervised learning to discover the relay decision algorithm and association rule. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
    Get full text
    Get full text
    Article
  15. 15

    Satisfiable Integer Programming Algorithm On Distributed Inter Process Communication (SIP-DIPC) by Abdul Hamid, Mohd Hakim, Abu, Nur Azman, Mohamad, Siti Nurul Mahfuzah, Idris, Aris, Zakaria, Zahriladha, Sulaiman, Zuraidah

    Published 2019
    “…Data Analytics is a superset to Data Mining. Data mining algorithm is getting popular support in recent development of Big Data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…The second component is the search process that is operated by a pattern matching. The third process is the parsing that is operated by a text mining algorithm. …”
    Article
  19. 19

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…The authors then demonstrate the operation of the algorithm by testing it on a typical scenario and analyse the results on several issues. …”
    Short Survey
  20. 20

    Compact structure representation in discovering frequent patterns for association rules by Mustapha, N., Sulaiman, M.N., Othman, M., Selamat, M.H.

    Published 2002
    “…Structure used in typical algorithms for solving this problem operate in several database scans and a large number of candidate generation. …”
    Get full text
    Get full text
    Get full text
    Article