Search Results - (( java implementation using algorithm ) OR ( pattern mining learning algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The Flex algorithm and the other two existing algorithms Apriori and DIC under the same specification are tested toward these datasets and their extraction times for mining frequent patterns were recorded and compared. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Tracking student performance in introductory programming by means of machine learning by Khan I., Al Sadiri A., Ahmad A.R., Jabeur N.

    Published 2023
    “…Big data; Decision trees; Education computing; Learning algorithms; Learning systems; Machine learning; Smart city; Students; Trees (mathematics); Educational data mining; Educational institutions; Hidden patterns; Introductory programming; Introductory programming course; Student performance; Student's performance; Weka; Data mining…”
    Conference Paper
  10. 10

    Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique) by Zubir, Nazira

    Published 2016
    “…Data mining is the process of mining the hidden patterns from the huge data. …”
    Get full text
    Get full text
    Monograph
  11. 11

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Comparative study of machine learning algorithms in data classification by Tan, Kai Jun

    Published 2025
    “…In many different fields, data mining, the process of identifying significant patterns in historical data, is essential to decision-making. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    E4ML: Alat untuk pembelajaran perlombongan data by Sainin, Mohd Shamrie, Siraj, Fadzilah

    Published 2004
    “…However, most of the tool is complicated to be used by the beginner user especially to student.The absence of specific and easy tool was made the student unable to understand the use and applications in this field.This paper discusses the development of the teaching aid tool (software) that consist of several machine learning algorithms for the purpose of explaining data mining processes.With this tool, teaching and learning for such course can be enhanced in order to provide better understanding in data mining and machine learning.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
    Get full text
    Get full text
    Final Year Project