Search Results - (( java implementation modified algorithm ) OR ( using semantic mining algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- mining algorithm »
- semantic mining »
-
1
-
2
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
Get full text
Conference or Workshop Item -
5
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…A variant of distance measurement, cosine similarity, is also embedded to this algorithm. The results are then compared with some existing algorithms, which are used for benchmark purposes. …”
Get full text
Get full text
Thesis -
6
Context aware app recommendation using email semantic analysis
Published 2019Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
8
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…The detection of semantic-based text anomaly is an interesting research area which has gained considerable attention from the data mining community. …”
Get full text
Get full text
Get full text
Thesis -
9
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…This threshold determines the influence of semantic similarity in the final combination algorithm. …”
Get full text
Thesis -
10
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
11
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
12
An automated learner for extracting new ontology relations
Published 2013“…As this task 'automatic recognition of semantic relations between pairs of words in text' can be used in many NLP applications, its implementation are demanding and may include many potential methodologies. …”
Get full text
Get full text
Get full text
Article -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
15
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…Ontology can be seen as a knowledge base that can be used to improve the image retrieval process with the aim of reducing the semantic gap between visual features and high-level semantics. …”
Get full text
Get full text
Thesis -
16
-
17
Generating a Malay sentiment lexicon based on wordnet
Published 2017“…Thus, various approaches and techniques are used to generate sentiment lexicon. The objective of this paper is to develop Malay sentiment lexicon generation algorithm based on WordNet. …”
Get full text
Get full text
Get full text
Article -
18
Unapparent information revelation for counterterrorism: Visualizing associations using a hybrid graph-based approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Stylometric authorship balanced attribution prediction method
Published 2011“…The techniques that manage such predictions are either using the statistical attributes such as frequent words or the use of more sophisticated semantic techniques such as lexicons. …”
Get full text
Get full text
Thesis -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
