Search Results - (( model evaluation styles algorithm ) OR ( problem representation mining algorithm ))
Search alternatives:
- problem representation »
- representation mining »
- evaluation styles »
- model evaluation »
- styles algorithm »
- mining algorithm »
-
1
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
Get full text
Get full text
Get full text
Article -
3
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
Get full text
Get full text
Get full text
Article -
4
Document classification based on kNN algorithm by term vector space reduction
Published 2023Conference Paper -
5
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
Get full text
Get full text
Thesis -
8
Direct approach for mining association rules from structured XML data
Published 2012“…Having the ability to extract information from XML data would answer the problem of mining the web contents which is a very useful and required power nowadays. …”
Get full text
Get full text
Thesis -
9
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We resolve two non-trivial problems, i.e. semantic representation of text and the complexity of graph matching. …”
Get full text
Get full text
Get full text
Article -
10
Evolutionary-based feature construction with substitution for data summarization using DARA
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
Get full text
Get full text
Thesis -
12
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Article -
13
Design of intelligent Qira’at identification algorithm
Published 2017“…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
Get full text
Get full text
Thesis -
14
Pendiskretan data set kasar menggunakan ta’akulan boolean
Published 2004“…Data discretization of rough set towards real attribute values is one of the important aspect in the data mining concepts, particularly the ones which involved classification problems. …”
Get full text
Get full text
Get full text
Article -
15
Evolving fuzzy grammar for crime texts categorization
Published 2015“…Machine learning (ML) based methods are the popular solution for this problem. However, the developed models typically provide low expressivity and lacking in human-understandable representation. …”
Get full text
Get full text
Get full text
Article -
16
Ranking-based pruning and weighted support model for gene association in frequent itemsets / Sofianita Mutalib
Published 2019“…High dimensional dataset presented by SNPs confirmed the reason to apply row enumeration strategy algorithm to mine frequent closed itemsets. It is found that SNPs with known risks to Type 2 Diabetes Mellitus (T2DM) occur in low support values, that cause the process of searching frequent itemsets to be repeated many times until the low support values are retrieved. …”
Get full text
Get full text
Thesis -
17
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…This is because all translated in TBS text have an intrinsic structural styles that can be used to improve the performance of a blind steganalysis model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…Text data are characterized by having problems related to ambiguity, high dimensionality, sparsity and text representation. …”
Get full text
Get full text
Get full text
Thesis -
19
Computational stylometric model for oath and oath-like expressions in Quranic text
Published 2014“…Two, various experimental results from the proposed model are compared against expert evaluation. The results showed that the proposed stylometric model of oaths has scalability in detecting implicit oaths, obtains dissimilar generalization levels in discriminating oath takers, and better adding in oath expressions explanation.…”
Get full text
Get full text
Thesis -
20
Isolated digit speech recognition in Malay language using Neuro-Fuzzy approach
Published 2009Get full text
Get full text
Conference or Workshop Item
