Search Results - (( java implementation modified algorithm ) OR ( using single mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Evaluation of data mining models for predicting concrete strength by Wong, Chuan Ming

    Published 2024
    “…The best performing model is selected and used to generate different sets objective-function that will be selected and used in a Particle Swarm Optimization algorithm to solve a single objective optimization problem that finds the optimal values of each concrete feature to maximize the strength of concrete. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease by Haruna, A.A., Muhammad, L.J., Yahaya, B.Z., Garba, E.J., Oye, N.D., Jung, L.T.

    Published 2019
    “…This disease is not epidemic but it re-mains the single most common cause of death. This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An application of IPA approach on the optimization of a mining port stockyard system by Ayu, Media Anugerah, Cardew-Hall, Michael

    Published 2002
    “…In this research a stockyard system of a mining operation was analyzed using backward analysis. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A direct ensemble classifier for imbalanced multiclass learning by Sainin, Mohd Shamrie, Alfred, Rayner

    Published 2012
    “…Researchers have shown that although traditional direct classifier algorithm can be easily applied to multiclass classification, the performance of a single classifier is decreased with the existence of imbalance data in multiclass classification tasks.Thus, ensemble of classifiers has emerged as one of the hot topics in multiclass classification tasks for imbalance problem for data mining and machine learning domain.Ensemble learning is an effective technique that has increasingly been adopted to combine multiple learning algorithms to improve overall prediction accuraciesand may outperform any single sophisticated classifiers.In this paper, an ensemble learner called a Direct Ensemble Classifier for Imbalanced Multiclass Learning (DECIML) that combines simple nearest neighbour and Naive Bayes algorithms is proposed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Satisfiable Integer Programming Algorithm On Distributed Inter Process Communication (SIP-DIPC) by Abdul Hamid, Mohd Hakim, Abu, Nur Azman, Mohamad, Siti Nurul Mahfuzah, Idris, Aris, Zakaria, Zahriladha, Sulaiman, Zuraidah

    Published 2019
    “…Data Analytics is a superset to Data Mining. Data mining algorithm is getting popular support in recent development of Big Data. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Detecting Critical Least Association Rules In Medical Databases by Herawan, Tutut

    Published 2010
    “…We also employed our scalable algorithm called Significant Least Pattern Growth algorithm (SLP-Growth) to mine the respective association rules. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Article
  17. 17

    Classification of Diabetes Mellitus (DM) using Machine Learning Algorithms by Sirajun Noor, Noor Azmiya

    Published 2021
    “…The objective of this study is to perform DM classification using various machine learning algorithms using Weka as a tool. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Parallel execution of distributed SVM using MPI (CoDLib) by Salleh N.S.M., Suliman A., Ahmad A.R.

    Published 2023
    “…To reduce the computational time during the process of training the SVM, a combination of distributed and parallel computing method, CoDLib have been proposed. Instead of using a single machine for parallel computing, multiple machines in a cluster are used. …”
    Conference paper
  19. 19

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The proposed algorithm is compared with the state-of-the-art feature selection algorithms using three different datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis