Search Results - (( java implication based algorithm ) OR ( filing rules mining algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…Main resources, server log files become a set of raw data where it's must go through with all the Web usage mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E-Learning portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Using Markov Model and Association Rules for Web Access Prediction by Siriporn, Chimphlee, Salim, Naomie, Ngadiman, Mohd. Salihin, Witcha, Chimphlee

    Published 2006
    “…Mining user patterns of log file can provide significant and useful informative knowledge. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Predicting next page access by Markov models and association rules on web log data by Chimphlee, S., Salim, N., B. Ngadiman, M. S., Chimphlee, W., Srinoy, S.

    Published 2006
    “…Mining user patterns of log file can provide significant and useful informative knowledge. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…Performance of the BVAGQ-AR technique comprised the following steps. First step is mining the data by using Apriori algorithm from Association Rules. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9