Search Results - (( java application based algorithm ) OR ( a evaluation mining algorithm ))
Search alternatives:
- application based »
- evaluation mining »
- java application »
- mining algorithm »
- a evaluation »
-
1
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
4
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…The research proposes new formula and algorithm which allows the evaluation of energy efficiency for the hardware of bitcoins mining. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Evaluation of data mining models for predicting concrete strength
Published 2024“…The best performing model is selected and used to generate different sets objective-function that will be selected and used in a Particle Swarm Optimization algorithm to solve a single objective optimization problem that finds the optimal values of each concrete feature to maximize the strength of concrete. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
An efficient algorithm to discover large and frequent itemset in high dimensional data
Published 2019“…These approaches improved both memory and time requirement of the algorithms to finish mining tasks. Algorithm RARE searches the rowset lattice in breadth-first manner which resulted to a reduced itemset intersections compare to other state-of-the-art algorithms, CARPENTER and IsTa. …”
Get full text
Get full text
Monograph -
7
Tree-based contrast subspace mining method
Published 2020“…Mining contrast subspace finds subsets of features or subspaces where a query object is most likely similar to target class against other class in a multidimensional data set of two classes. …”
Get full text
Get full text
Get full text
Thesis -
8
Evaluation and optimization of frequent association rule based classification
Published 2014“…In this paper, a systematic way to evaluate the association rules discovered from frequent itemset mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriated sequence of usage is presented. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
11
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
12
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…The algorithm tackles a different root cause of the problem at each layer. …”
Get full text
Get full text
Thesis -
13
Prime-based method for interactive mining of frequent patterns
Published 2010“…Thus far, a few efficient interactive mining algorithms have been proposed. …”
Get full text
Get full text
Thesis -
14
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023Conference Paper -
16
An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease
Published 2019“…This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. A performance evaluation of the improved algorithm was carried out against the traditional C4.5 Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Case Slicing Technique for Feature Selection
Published 2004“…One of the problems addressed by machine learning is data classification. Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
18
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Comparing the performance of FCBF, Chi-Square and relief-F filter feature selection algorithms in educational data mining
Published 2019“…Educational Data Mining (EDM) is a very vital area of Data Mining, and it is helpful in predicting the performance of students. …”
Get full text
Get full text
Article
