Search Results - (( java application based algorithm ) OR ( _ evaluating mining algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evaluation of data mining models for predicting concrete strength by Wong, Chuan Ming

    Published 2024
    “…These models are all evaluated with hyperparameter tuning and different feature selection techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Energy efficiency of the bitcoin mining hardware and related blockchain technology by Noor Faiqah Izzati, Afandi

    Published 2018
    “…The research proposes new formula and algorithm which allows the evaluation of energy efficiency for the hardware of bitcoins mining. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    An efficient algorithm to discover large and frequent itemset in high dimensional data by Zulkurnain, Nurul Fariza

    Published 2019
    “…For this reason, this research has proposed two new algorithms; RARE and RARE II, which mine colossal closed itemsets. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…In this paper, a systematic way to evaluate the association rules discovered from frequent itemset mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriated sequence of usage is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15

    Data mining techniques for disease risk prediction model: A systematic literature review by Ahmad W.M.T.W., Ghani N.L.A., Drus S.M.

    Published 2023
    “…Decision making; Decision trees; Forecasting; Health care; Soft computing; Accuracy evaluation; Classification technique; Data mining algorithm; Descriptive analysis; Disease risks; Infectious disease; Risk prediction models; Systematic literature review; Data mining…”
    Conference Paper
  16. 16

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…Every context requires its own customized text mining algorithms in order to achieve best results. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
    Get full text
    Get full text
    Final Year Project