Search Results - (( processes formation mining algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- processes formation »
- application mining »
- formation mining »
- mining algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
RELMARK: An innovative algorithm for preprocessing of transactional business data
Published 2015“…Association rule mining is a popular research topic due to many useful applications.The initial task in producing association rule is to ensure that only suitable data formats are fed into the mining process.Providing a correct data format for association rule mining is an essential and crucial task as wrong data will yield wrong results and interpretations.In this research work, an efficient algorithm for converting relational data format into transactional data format is presented.This transactional data format suited the SAS Enterprise Miner Software for association rule mining technique. …”
Get full text
Get full text
Article -
4
Framework for mining XML format business process log data
Published 2024“…This study introduces an alternative approach for mining XML format documents which can be modelled into tree-structured format. …”
Get full text
Get full text
Thesis -
5
-
6
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…The mining process entails data cleaning, formatting, filtering, and identifying the candidate keywords. …”
Article -
7
The semantics of norms mining in multi-agent systems
Published 2023“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Conference paper -
8
The semantics of norms mining in multi-agent systems
“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Get full text
Conference or Workshop Item -
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A norms mining approach to norms detection in multi-agent systems
Published 2023“…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
Conference paper -
13
A norms mining approach to norms detection in multi-agent systems
Published 2012“…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
Get full text
Conference or Workshop Item -
14
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
15
Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm
Published 2012“…We use frequent pattern growth (FP-Growth) algorithm in the data processing step to build the FP-tree data structure and mine it for frequents itemsets. …”
Get full text
Get full text
Conference or Workshop Item -
16
Automatic clustering of gene ontology by genetic algorithm
Published 2006“…Experimental results and an example of modularized Gene Ontology in RDF/XML format are given to illustrate the effectiveness of the algorithm…”
Get full text
Get full text
Article -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
18
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
Get full text
Thesis -
19
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
20
Network problems detection and classification by analyzing syslog data
Published 2016“…The method used data mining tool to classify the syslog messages while the description part of the syslog message was used for classification process. …”
Get full text
Get full text
Get full text
Thesis
