Search Results - (( processes formation mining algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    RELMARK: An innovative algorithm for preprocessing of transactional business data by Mohd Shaharanee, Izwan Nizal, Mohd Jamil, Jastini, Hashim, Kamarul Faizal

    Published 2015
    “…Association rule mining is a popular research topic due to many useful applications.The initial task in producing association rule is to ensure that only suitable data formats are fed into the mining process.Providing a correct data format for association rule mining is an essential and crucial task as wrong data will yield wrong results and interpretations.In this research work, an efficient algorithm for converting relational data format into transactional data format is presented.This transactional data format suited the SAS Enterprise Miner Software for association rule mining technique. …”
    Get full text
    Get full text
    Article
  4. 4

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…This study introduces an alternative approach for mining XML format documents which can be modelled into tree-structured format. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Context identification of scientific papers via agent-based model for text mining (ABM-TM) by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…The mining process entails data cleaning, formatting, filtering, and identifying the candidate keywords. …”
    Article
  7. 7

    The semantics of norms mining in multi-agent systems by Mahmoud M.A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…We define the semantics of entities and processes that are involved in the norms mining technique. …”
    Conference paper
  8. 8

    The semantics of norms mining in multi-agent systems by Ahmed Mahmoud, Moamin, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mohd Yusoff, Mohd Zaliman, Mustapha, Aida

    “…We define the semantics of entities and processes that are involved in the norms mining technique. …”
    Get full text
    Conference or Workshop Item
  9. 9

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A norms mining approach to norms detection in multi-agent systems by Mahmoud M.A., Ahmad M.S., Ahmad A., Mohd Yusoff M.Z., Mustapha A.

    Published 2023
    “…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
    Conference paper
  13. 13

    A norms mining approach to norms detection in multi-agent systems by A. Mahmoud, Moamin, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mohd Yusoff , Mohd Zaliman, Mustapha, Aida

    Published 2012
    “…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm by G. Noma, Nasir, Mohd Khanapi, Abd Ghani

    Published 2012
    “…We use frequent pattern growth (FP-Growth) algorithm in the data processing step to build the FP-tree data structure and mine it for frequents itemsets. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Automatic clustering of gene ontology by genetic algorithm by Othman, Razib M., Deris, Safaai, Zakaria, Zalmiyah, Illias, Rosli M., Mohamad, Saberi M.

    Published 2006
    “…Experimental results and an example of modularized Gene Ontology in RDF/XML format are given to illustrate the effectiveness of the algorithm…”
    Get full text
    Get full text
    Article
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  18. 18

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
    Get full text
    Thesis
  19. 19
  20. 20

    Network problems detection and classification by analyzing syslog data by Jarghon, Fidaa A. M.

    Published 2016
    “…The method used data mining tool to classify the syslog messages while the description part of the syslog message was used for classification process. …”
    Get full text
    Get full text
    Get full text
    Thesis