Search Results - (( java application using algorithm ) OR ( rule extraction modeling algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The mined frequent patterns are then used in generating association rules. Three models were applied in this task which consist of traditional model, constraint model and representative model which produce three kinds of rules respectively; all association rules, association rules with 1-consequence and representative rules. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection by Yap K.S., Wong S.Y., Tiong S.K.

    Published 2023
    “…The improved model is applied to two benchmark problems, and the rules extracted are analyzed, discussed and compared with other published methods. …”
    Conference Paper
  4. 4
  5. 5

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…Apart from introducing the TIP model, this research also addressed the issues of missing values, discretization and extracting minimum rules. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Self learning neuro-fuzzy modeling using hybrid genetic probabilistic approach for engine air/fuel ratio prediction by Al-Himyari, Bayadir Abbas

    Published 2017
    “…An enhanced hybrid Genetic Algorithm based Fuzzy Bayesian classifier (GA-FBC) was proposed to help the NFS in the rule extraction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Dingle's Model-based EEG Peak Detection using a Rule-based Classifier by Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2015
    “…The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation by Yousfi, Bilal, Zeki, Akram M.

    Published 2017
    “…Subsequently, after features extraction, a classification algorithm (Hidden Markov Models (HMM)) is employed to compare the features extracted in real-time with that available in the knowledge base.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    A rule-based parameter aided with object-based classification approach for extraction of building and roads from WorldView-2 images by Ziaei, Zahra, Pradhan, Biswajeet, Mansor, Shattri

    Published 2014
    “…The three applied algorithms are support vector machines (SVMs), nearest neighbour (NN) and proposed rule-based system. …”
    Get full text
    Get full text
    Article
  12. 12

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…Fuzzy rules are very important elements that should be taken consideration seriously when applying any fuzzy system.This paper proposes the framework of Mamdani Fuzzy Rule-based System with Weighted Subset-hood Based Algorithm (MFRBS-WSBA) in the fuzzy rule extraction for electricity load demand forecasting.The framework consist of six main steps: (1) Data Collection and Selection; (2) Preprocessing Data; (3) Variables Selection; (4) Fuzzy Model; (5) Comparison with Other FIS and (6) Performance Evaluation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An integrated model of automated elementary programming feedback using assisted and recommendation approach by Safei, Suhailan

    Published 2017
    “…Meanwhile, similar difficulty groups of the computer programs were generated using a K-Means clustering algorithm that was enhanced with ranking consideration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…The accuracy of the classification rules by the proposed models was high compared to other models.…”
    Get full text
    Get full text
    Thesis
  15. 15

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, R., Kasim, M.M., Othman, M.

    Published 2016
    “…This paper proposes the framework of Mamdani Fuzzy Rule-based System with Weighted Subset-hood Based Algorithm (MFRBS-WSBA) in the fuzzy rule extraction for electricity load demand forecasting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…However, in the event of having multiple variables coupled with a few features, the classification problem will be getting more sophisticated, as a result human expert may not be able to derive proper rules. This paper presents a genetic-algorithm-based fuzzy inference system for extracting highly comprehensible fuzzy rules to be implemented in human practices without detailed computation (hereafter denoted as GA-FIS). …”
    Article
  17. 17

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Data mining reduction methods and performances of rules by Ahmad, Faudziah, Basir, Mohammad Aizat

    Published 2009
    “…In summary, results show that in terms of performance of rules, Genetic Algorithm has produced the highest number of rules followed by Johnson’s Algorithm and Holte’s 1R.The best classifier for extracting rules in this study is VOT (Voting of Object Tracking).In terms of performance of rules, best results comes from rules with 30 attributes, followed by rules with 1 intersection attribute and lastly rules with 3 intersection attributes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
    Get full text
    Get full text
    Thesis