Search Results - (( structure based mining algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  7. 7

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…The third algorithm is the Ontology Based Text Classification (OBTC) and is designed to reduce the dimensionality of training sets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  10. 10
  11. 11

    Frequent itemset mining using graph theory / Mohammad Arsyad Mohd Yakop by Mohd Yakop, Mohammad Arsyad

    Published 2017
    “…The Directed Acyclic Graph in High Dimensional Dataset Mining (DAGHDDM) is a graph-based mining algorithm that represents itemsets in complete graph before FIM takes place. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…The enormous content of information on the World Wide Web makes it obvious candidate for data mining research. Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…The enormous of information on the World Wide Web makes it obvious candidate for data mining research. Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Combining data mining algorithm and object-based image analysis for detailed urban mapping of hyperspectral images by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi, Mansor, Shattri, Ahmad, Noordin

    Published 2014
    “…The images were used to explore the combined performance of a data mining (DM) algorithm and object-based image analysis (OBIA). …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma by -, Sunardi, -, Abdul Fadlil, Perdana Kusuma, Nur Makkie

    Published 2023
    “…The data collection method in this study uses data mining technology on structured and unstructured data. …”
    Get full text
    Get full text
    Article
  19. 19

    Frequent itemset mining in high dimensional data: a review by Md. Zaki, Fatimah Audah, Zulkurnain, Nurul Fariza

    Published 2019
    “…These algorithms are discussed based on the proposed search strategies which include row-enumeration vs. column-enumeration, bottom-up vs. top-down traversal, and a number of new data structures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…This paper investigates the effects of using a multiobjective genetic algorithm (MOGA) based clustering technique to cluster texts for topic extraction which is designed based on the structure and purity of the clusters in order to determine the optimal initial centroids and the number of clusters, k. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article