Search Results - (( strategy implementation mining algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- strategy implementation »
- normalization algorithm »
- implementation mining »
- data normalization »
- mining algorithm »
- java »
-
1
-
2
RARE: mining colossal closed itemset in high dimensional data
Published 2018“…With that, this paper investigated the strategies implemented in both row and column enumerationbased algorithms, hence proposing the RARE; a breadth-first bottom-up row-enumeration algorithm, in mining colossal closed itemsets in high-dimensional data…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
4
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…Depth first strategy and vertical counting strategy are used in mining frequent patterns and computing the support of the patterns respectively. …”
Get full text
Get full text
Thesis -
5
A novel approach to data mining using simplified swarm optimization
Published 2011“…Therefore, the proposed SSO rule-based classifier with local search strategies has offered a new paradigm shift in solving complex problems in data mining which may not be able to be solved by other benchmark classifiers.…”
Get full text
Get full text
Thesis -
6
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Both algorithm implemented and analyzed in Player/Stage simulation. …”
Get full text
Get full text
Get full text
Article -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
8
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
11
Application model of k-means clustering: Insights into promotion strategy of vocational high school
Published 2023“…Data mining techniques in this initiative were applied to achieve in determining the promotional strategy. …”
Article -
12
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…The improved search strategy implemented the non-chronological backtracking search that potentially prunes the large portion of search space. …”
Get full text
Get full text
Thesis -
13
The implementation of market basket analysis in menu association model for Corm Café / Nur Amalina Kamarulzaman
Published 2018“…To find the frequent item mining, the researcher had proposed some efficient algorithm which is FP-Growth. …”
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
15
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Ranking-based pruning and weighted support model for gene association in frequent itemsets / Sofianita Mutalib
Published 2019“…High dimensional dataset presented by SNPs confirmed the reason to apply row enumeration strategy algorithm to mine frequent closed itemsets. …”
Get full text
Get full text
Thesis -
18
Dynamic investment model for the restructed power market in the presence of wind source
Published 2014“…In the third step, the long term optimal investment strategies of the hybrid wind-thermal investor are determined based on the dynamic programming algorithm by considering the long term states of demand growth and fuel price uncertainties. …”
Get full text
Get full text
Thesis -
19
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
