Search Results - (( problem based mining algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Propositional satisfiability algorithm to find minimal reducts for data mining by Bakar, A.A., Sulaiman, M.N., Othman, M., Selamat, M.H.

    Published 2002
    “…An algorithm in finding minimal reducts based on Prepositional Satisfiability (SAT) algorithm is proposed. …”
    Get full text
    Get full text
    Article
  3. 3

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…This problem can cause the imbalance in sales. Based on the problem statement, Genetic Algorithm was applied to test whether it is compatible to predict the future sales. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A Rough-Apriori Technique in Mining Linguistic Association Rules by Choo, Yun Huoy, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2008
    “…This paper has proposed a rough-Apriori based mining technique in mining linguistic association rules focusing on the problem of capturing the numerical interval with linguistic terms in quantitative association rules mining. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    Accelerated mine blast algorithm for ANFIS training for solving classification problems by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
    Get full text
    Get full text
    Article
  7. 7

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Frequent itemset mining using graph theory / Mohammad Arsyad Mohd Yakop by Mohd Yakop, Mohammad Arsyad

    Published 2017
    “…The Directed Acyclic Graph in High Dimensional Dataset Mining (DAGHDDM) is a graph-based mining algorithm that represents itemsets in complete graph before FIM takes place. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING by ABDUL RAHIM, NURALIAH

    Published 2020
    “…Data mining delivers fact-based insight into how customer service business processes have been executed from the data collected to handle the problems and requests of customers. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2009
    “…Prediction of user future movements and intentions based on the users’ clickstream data is a main challenging problem in Web based recommendation systems. …”
    Get full text
    Get full text
    Article
  15. 15

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Most sophisticated methods in data mining address this problem to some extent, but not fully, and can be improved by addressing the problem more directly. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…Hence, it is required to develop effective imbalanced LR-based methods to be widely used in data mining applications. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Position score weighting technique for mining web content outliers. by Mustapha, Norwati, Mustapha, Aida

    Published 2013
    “…The stemming algorithm was usually used to reduce derived words to their stem, base or root form. …”
    Get full text
    Get full text
    Get full text
    Article