Search Results - (( rule generation based algorithm ) OR ( java application using algorithm ))
Search alternatives:
- generation based »
- java application »
- rule generation »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
NIS-Apriori-based rule generation with three-way decisions and its application system in SQL
Published 2020“…Furthermore, it is logically sound and complete with regard to the rules. Subsequently, the implementation of the NIS-Apriori algorithm in SQL is described and a few new topics induced by effects of NIS-Apriori-based rule generation are confirmed. …”
Get full text
Get full text
Article -
3
-
4
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
5
Topic identification using filtering and rule generation algorithm for textual document
Published 2015“…The rule generation algorithm (TopId) is proposed to identify topic for each verse based on the extracted terms. …”
Get full text
Get full text
Get full text
Thesis -
6
Rule Generation Based On Structural Clustering For Automatic Question Answering
Published 2009“…To address these issues, an automatic structural rule generation algorithm is presented via clustering, where a center sentence-based clustering method is designed to automatically generate rules for QA systems.…”
Get full text
Get full text
Thesis -
7
Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA)
Published 2013“…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy
Published 2021“…It can be concluded that the SEOA outperformed all of the other algorithms. It was also found that the SEOA based on the Two-Point Heading Rule (3) under the third inflow scenario provided the most power generation for the KHI and KAIV systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Automated study plan generator using rule-based and knapsack problem
Published 2022“…A combination of rule-based and knapsack problem were proposed to generate an automated study plan. …”
Get full text
Get full text
Get full text
Article -
10
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Classification rules were generated based on the best reduct. …”
Get full text
Get full text
Thesis -
11
Optimal operation of hydropower reservoirs under climate change
Published 2024“…However, by applying adaptive rule curves, the hydropower generation may be improved even under the climate change conditions. …”
Article -
12
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…These algorithms generate paths using random numbers and perform efficiently in guiding the robot in known environments. …”
Get full text
Get full text
Thesis -
13
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
Get full text
Get full text
Thesis -
14
A new ant based rule extraction algorithm for web classification
Published 2011“…Using Classifier-based attribute subset selection will reduce more attributes, but sacrifice the performance of the classifier.A hybrid ant colony optimization with simulated annealing algorithm to discover rules from data is proposed.The simulated annealing technique will minimize the problem of low quality discovered rule by an ant in a colony.The best rule for a colony will then be chosen and later the best rule among the colonies will be included in the rule set.The best rule for a colony will then be chosen and later the best rule among the colonies will be included in the rule set.The rule set is arranged in decreasing order of generation.Thirteen data sets which consist of discrete and continuous data were used to evaluate the performance of the proposed algorithm in terms of accuracy, number of rules and number of terms in the rules.Experimental results obtained from the proposed algorithm are comparable to the results of the Ant-Miner algorithm in terms of rule accuracy but are better in terms of rule simplicity.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
15
Monotone Fuzzy Rule Interpolation for Practical Modeling of the Zero-Order TSK Fuzzy Inference System
Published 2022“…However, such a complete and monotone fuzzy rule-base is not always available in practice. In this article, we develop an MFRI modeling scheme for generating a monotone zero-order TSK FIS from a monotone and incomplete fuzzy rule-base. …”
Get full text
Get full text
Get full text
Article -
16
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
17
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
Get full text
Get full text
Thesis -
18
An Apriori-based Data Analysis on Suspicious Network Event Recognition
Published 2019“…Apriori-based rule generators, which are powered by the DIS-Apriori algorithm and the NIS-Apriori algorithm, are applied to analyze the data sets available in the IEEE BigData 2019 Cup: Suspicious Network Event Recognition. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimal operation of hydropower reservoirs under climate change
Published 2023“…However, by applying adaptive rule curves, the hydropower generation may be improved even under the climate change conditions. …”
Article -
20
