Search Results - (((( between working algorithm ) OR ( pattern using algorithm ))) OR ( patterns among algorithm ))

Refine Results
  1. 1

    Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour by Jan, Ketil Arnulf, Kai, Rune Larsen, Øyvind, Lund Martinsen, Bong, Chih How

    Published 2014
    “…Language processing algorithms were used to calculate the semantic similarity among all items in state-of-the-art surveys from Organisational Behaviour research. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Box-jenkins and genetic algorithm hybrid model for electricity forecasting system by Mahpol, Khairil Asmani

    Published 2005
    “…By adopting the GA blind search, the algorithm combines searching techniques and their capabilities to learn about the relationship of the pattern-recognition of the past data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel by Mohammad Asaduzzaman , Rasel

    Published 2024
    “…Several imaging, computer vision, and pattern recognition algorithms are employed to describe five dermoscopic features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…The limitation of the available works on min-sum based LDPC code decoding algorithm specifically for DF protocol relay system motivated this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An expanded square pattern technique in swarm of quadcopters for exploration algorithm by Zuhri, Muhammad Fuad Reza, Ismail, Amelia Ritahani

    Published 2017
    “…We simulate the swarm-based exploration algorithm with expanded square pattern using a VREP simulator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset by Julaily Aida, Jusoh, Wan Aezwani, Wan Abu Bakar, Mustafa, Man

    Published 2018
    “…This paper proposes IF-Postdiffset as a new variant in R-Eclat algorithm. This paper also highlights the performance of infrequent mining pattern from the transaction database among different variants of the R-Eclat algorithm regarding its execution time.…”
    Get full text
    Get full text
    Article
  7. 7

    Predicting the success of suicide terrorist attacks using different machine learning algorithms by Hossain, Md Junayed, Abdullah, Sheikh Md, Barkatullah, Mohammad, Miahh, Md Saef Ulla, Sarwar, Talha, Monir, Md Fahad

    Published 2022
    “…With an accuracy rate of 98.4% and an AUC-ROC score of 99.9%, the Random Forest classifier was the most accurate among all other algorithms. This model is more trustworthy than previous work and provides a useful comparison between machine learning methods and an artificial neural network because it is less dependent and has a multiclass target feature.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…An algorithm called Flex (Frequent lexicographic patterns) has been proposed in obtaining a good performance of searching li-equent patterns. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Using unique-prime-factorization theorem to mine frequent patterns without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2011
    “…Finding such frequent patterns plays an essential role in mining associations, correlations and many other interesting relationships among data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Sequential pattern mining using PrefixSpan with pseudoprojection and separator database by Saputra, D., Rambli, D.R.A., Foong, Oi Mean

    Published 2008
    “…Future research includes exploring the use of Separator Database in PrefixSpan with pseudoprojection to improve mining constrained sequential patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi by Yazdi, Saeed Reza Aghabozorgi Sahaf

    Published 2013
    “…Clustering such complex data can discover patterns which have valuable information. Time-series clustering is not only useful as an exploratory technique but also as a subroutine in more complex data mining algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Mining least relational patterns from multi relational tables by Selamat, Siti Hairulnita, Mat Deris, Mustafa, Mamat, Rabiei, Bakar, Zuriana Abu

    Published 2005
    “…In this paper, we propose an algorithm called Extraction Least Pattern (ELP) algorithm that using a couple of predefined minimum support thresholds. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Thesis
  16. 16

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…Subsequently, a region growing algorithm was used to locate the pectoral muscle and suppress it from the breast. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The analysis of road traffic fatality pattern for Selangor, Malaysia case study by Radzuan, N. Q., Mohd Hasnun Ariff, Hassan, Abu Kassim, K. A., Ab. Rashid, A. A., Intan Suhana, Mohd Razelan, Nur Aqilah, Othman

    Published 2021
    “…The analysed algorithms among others are neural network, random forest, decision tree, logistic regression, naïve Bayes, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A framework for classification software security using common vulnerabilities and exposures by Hassan, Nor Hafeizah

    Published 2018
    “…This inclusive of the investigation of vulnerability classification objectives,processes,classifiers and focus domains among prominent framework.Final step is to construct the framework by establishing the formal presentation of the vulnerability classification algo-rithm.The validation process was conducted empirically using statistical method to assess the accuracy and consistency by using the precision and recall rate of the algorithm on five data sets each with 500 samples.The findings show a significant result with precision's error rate or p value is between 0.01 and 0.02 with error rate for recall's error rate is between 0.02 and 0.04.Another validation was conducted to verify the correctness of the classification by using expert opinions,and the results showed that the ambiguity of several cases were subdue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
    Get full text
    Get full text
    Get full text
    Article