Search Results - (((( patterns using algorithm ) OR ( between mining algorithm ))) OR ( patterns acs algorithm ))
Search alternatives:
- mining algorithm »
- using algorithm »
- patterns using »
- between mining »
- acs algorithm »
- patterns acs »
-
1
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
2
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…During the mining process, the mining algorithm reduces the number of candidate patterns and comparisons by using a new candidate set called candidate head set and several efficient pruning techniques. …”
Get full text
Get full text
Article -
5
The application of voltage sags pattern to locate a faulted section in distribution network
Published 2010“…This paper proposes an alternative automated fault location algorithm to locate a faulted section in distribution network using only voltage sag data monitored at the primary substation. …”
Get full text
Get full text
Article -
6
Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing
Published 2015“…The algorithms are ACS(GA), ACS+GA, ACS(TS), and ACS+TS. …”
Get full text
Get full text
Get full text
Thesis -
7
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
Get full text
Get full text
Thesis -
8
Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida
Published 2019“…Combinations of feature selection and classification algorithms were used for mortality prediction post ACS. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparative study of apriori-variant algorithms
Published 2016“…One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
11
Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm
Published 2012“…We use frequent pattern growth (FP-Growth) algorithm in the data processing step to build the FP-tree data structure and mine it for frequents itemsets. …”
Get full text
Get full text
Conference or Workshop Item -
12
Analysis of K-Mean and X-Mean Clustering Algorithms Using Ontology-Based Dataset Filtering
Published 2021“…In the field of computer science, data mining facilitates the extraction of useful knowledge and patterns from a huge amount of data. …”
Get full text
Get full text
Get full text
Article -
13
An improved ACS algorithm for data clustering
Published 2020“…To improve the ACOC, this study proposes a modified ACOC, called M-ACOC, which has a modification rate parameter that controls the convergence of the algorithm. Comparison of the performance of several common clustering algorithms using real-world datasets shows that the accuracy results of the proposed algorithm surpasses other algorithms.…”
Get full text
Get full text
Get full text
Article -
14
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Then, the mapping percentages between the predefined and produced clusters are used to assess the performance of the proposed algorithm. …”
Get full text
Get full text
Article -
15
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Then, the mapping percentages between the predefined and produced clusters are used to assess the performance of the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Xilinx (FPGA) design for single phase DC-AC matrix converter with sinusoidal pulse width modulation (SPWM) / Mohd Raduan Md Adam
Published 2003“…One sine waveform with one carrier waveforms is used to generate the PWM. The PWM pattern proposes occupies less FPGA block cell hence more space could be used for other control algorithm. …”
Get full text
Get full text
Thesis -
17
Identifying Relationship between Hearing loss Symptoms and Pure-tone Audiometry Thresholds with FP-Growth Algorithm
Published 2013“…The purpose of this study was to find the relationship that exists between pure-tone audiometry threshold values and hearing loss symptoms in a medical datasets of 339 hearing loss patients using association rule mining algorithm. …”
Get full text
Get full text
Get full text
Article -
18
-
19
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…The utilization of data that is assembled by Web Usage Mining gives the organizations the capacity to deliver results more compelling to their organizations and expanding of sales. Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis
