Search Results - ((((mining algorithm) OR (cloud algorithm))) OR (drops algorithm))

Refine Results
  1. 1

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Dropping down the maximum item set: improving the stylometric authorship attribution algorithm in the text mining for authorship investigation by Mustafa, Tareef Kamil, Mustapha, Norwati, Azmi Murad, Masrah Azrifah, Sulaiman, Md. Nasir

    Published 2010
    “…In this study, we propose an authorship attribution algorithm, improving the accuracy of Stylometric features of different professionals so it can be discriminated nearly as well as fingerprints of different persons using authorship attributes. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…In this context, proposing Forensic Examination and Analysis Methodology using Data mining (FED) and Forensic Examination and analysis methodology using Data mining and Optimization (FEDO) models address these issues. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cyberbullying detection and prevention: Data mining in social media by Sultan D., Suliman A., Toktarova A., Omarov B., Mamikov S., Beissenova G.

    Published 2023
    “…Cloud computing; Computer crime; Data Science; Deep learning; Learning algorithms; Social networking (online); Children and adolescents; Cyber bullying; England; European Countries; Real time; Social media; Training machines; Data mining…”
    Conference Paper
  8. 8

    Mining sequence of event from vector-based spatiotemporal database by B.Y., Widodo

    Published 2007
    “…In this paper, we propose VectoFlowMiner, an extension to FlowMiner, a spatiotemporal data mining algorithm. FlowMiner, are targeted for mining from raster-based spatial data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Discovering rules for nursery students using apriori algorithm by Marufuzzaman M., Gomes D.J., Rupai A.A.A., Sidek L.M.

    Published 2023
    “…The study was conducted using association rule mining where several mining rules were generated using the Apriori algorithm. …”
    Article
  10. 10

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…Mobile edge cloud computing (MECC) systems extend computational, networking, and storage capabilities of centralized cloud computing systems through edge servers at one-hop wireless distances from mobile devices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Siddiqui, Sumrana, Sarkar, Rashel

    Published 2024
    “…A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour by Hadi , Naghavipour

    Published 2022
    “…On that basis, the second contribution of this thesis is proposing a fast fuzzy evolutionary algorithm with minimal stochastic behaviour. Furthermore, this thesis contributes to the body of knowledge by introducing a novel method called Fuzzy Rough set Genetic Algorithm (FRGA) that take on efficiency of metaheuristics while reducing search space by leveraging the data mining aspect of rough set theory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Analyzing students records to identify patterns of students' performance by Hoe A.C.K., Ahmad M.S., Hooi T.C., Shanmugam M., Gunasekaran S.S., Cob Z.C., Ramasamy A.

    Published 2023
    “…Finally, the results from the application of the CHAID algorithm aimed at predicting students' academic success is presented. � 2013 IEEE.…”
    Conference Paper
  14. 14

    A Review on Data Stream Classification by A. A., Haneen, Noraziah, Ahmad, Mohd Helmy, Abd Wahab

    Published 2018
    “…As such the typical tasks of searching data have been linked to streams of data that are inclusive of clustering, classification, and repeated mining of pattern. This paper presents several data stream clustering approaches, which are based on density, besides attempting to comprehend the function of the related algorithms; both semi-supervised and active learning, along with reviews of a number of recent studies.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…Proposed cloud brokering algorithms works with different types of cloud provider and deal with various user requirements. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Land Use Changes in Jeli, Kelantan by Muhammad Firdaus Abdul Karim

    Published 2013
    “…Land use change percentage and urban land expansion index (SI) are selected algorithm in this study. The overall accuracy assessment ranged from 61.39% to 92.05% which is moderate to accurate. …”
    Get full text
    Undergraduate Final Project Report
  17. 17

    Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing by Parmesivan, Yuganes, Hasan, Sazlinah, Muhammed, Abdullah

    Published 2018
    “…Cloud computing has become biggest buzz in the computer era these days.It runs entire operating systems on the cloud and doeverything on cloud to store data off-site.Cloud computing is primarily based on grid computing, but it’s a new computational model.Cloud computing has emerged into a new opportunity to further enhance way of hosting data centre and provide services.The primary substance of cloud computing is to deal the computing power,storage,different sort of stages and services which assigned tothe external users on demand through the internet.Task scheduling in cloud computing is vital role optimisation and effective dynamic resource allocation for load balancing.In cloud, the issue focused is under utilisation and over utilisation of the resources to distribute workload of multiple network links for example,when cloud clients try to access and send request tothe same cloud server while the other cloud server remain idle at that moment, leads to the unbalanced of workload on cloud data centers.Thus, load balancing is to assign tasks to the individual cloud data centers of the shared system so that no single cloud data centers is overloaded or under loaded.A Hybrid approach of Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm is combined in order to get effective response time.The proposed hybrid algorithm has been experimented by using CloudSim simulator.The result shows that the hybrid load balancing algorithm improves the cloud system performance by reducing the response time compared to the Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A priority based job scheduling algorithm in cloud computing by Shamsollah, Ghanbari, Othman, Mohamed

    Published 2012
    “…Job scheduling algorithms is one of the most challenging theoretical issues in the cloud computing area. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
    Get full text
    Get full text
    Get full text
    Thesis