Search Results - (( model evaluation styles algorithm ) OR ( problem representation mining algorithm ))

Refine Results
  1. 1

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Compact structure representation in discovering frequent patterns for association rules by Mustapha, Norwati, Sulaiman, Md. Nasir, Othman, Mohamed, Selamat, Mohd Hasan

    Published 2002
    “…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Compact structure representation in discovering frequent patterns for association rules by Mustapha, N., Sulaiman, M.N., Othman, M., Selamat, M.H.

    Published 2002
    “…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…Having the ability to extract information from XML data would answer the problem of mining the web contents which is a very useful and required power nowadays. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Pendiskretan data set kasar menggunakan ta’akulan boolean by Rokiah @ Rozita Ahmad, Maslina Darus, Siti Mariyam Shamsuddin, Azuraliza Abu Bakar

    Published 2004
    “…Data discretization of rough set towards real attribute values is one of the important aspect in the data mining concepts, particularly the ones which involved classification problems. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…Machine learning (ML) based methods are the popular solution for this problem. However, the developed models typically provide low expressivity and lacking in human-understandable representation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Ranking-based pruning and weighted support model for gene association in frequent itemsets / Sofianita Mutalib by Mutalib, Sofianita

    Published 2019
    “…High dimensional dataset presented by SNPs confirmed the reason to apply row enumeration strategy algorithm to mine frequent closed itemsets. It is found that SNPs with known risks to Type 2 Diabetes Mellitus (T2DM) occur in low support values, that cause the process of searching frequent itemsets to be repeated many times until the low support values are retrieved. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…This is because all translated in TBS text have an intrinsic structural styles that can be used to improve the performance of a blind steganalysis model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Text data are characterized by having problems related to ambiguity, high dimensionality, sparsity and text representation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Computational stylometric model for oath and oath-like expressions in Quranic text by Alqurneh, Ahmad

    Published 2014
    “…Two, various experimental results from the proposed model are compared against expert evaluation. The results showed that the proposed stylometric model of oaths has scalability in detecting implicit oaths, obtains dissimilar generalization levels in discriminating oath takers, and better adding in oath expressions explanation.…”
    Get full text
    Get full text
    Thesis
  20. 20