Search Results - (( pattern ((mining algorithm) OR (matching algorithm)) ) OR ( patterns bayes algorithm ))
Search alternatives:
- mining algorithm »
- bayes algorithm »
-
1
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
The analysis of road traffic fatality pattern for Selangor, Malaysia case study
Published 2021“…Supervised machine learning algorithm in Orange data mining software was considered in this analysis. …”
Get full text
Get full text
Get full text
Article -
3
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…The analysis using the Naive Bayes Algorithm produces a predictive model, which shows the results of online fraud victim profiles based on the weights for each attribute. …”
Get full text
Get full text
Article -
4
Comparative study of machine learning algorithms in data classification
Published 2025“…In many different fields, data mining, the process of identifying significant patterns in historical data, is essential to decision-making. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023Conference Paper -
6
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
Get full text
Get full text
Thesis -
7
Pattern Discovery Using K-Means Algorithm
Published 2024“…This paper will discuss the results of a pattern extraction process using a clustering algorithm that is k-means. …”
Proceedings Paper -
8
Evolving fuzzy grammar for crime texts categorization
Published 2015“…Results show that the EFG algorithm produces results that are close in performance with the other ML methods while being highly interpretable, easily integrated into a more comprehensive grammar system and with lower model retraining adaptability time.…”
Get full text
Get full text
Get full text
Article -
9
Automatic document clustering and indexing of multiple documents using KNMF for feature extraction through Hadoop and lucene on big data
Published 2023“…Automatic indexing; Big data; Cluster analysis; Extraction; Factorization; Indexing (of information); Information retrieval; K-means clustering; Natural language processing systems; Open source software; Open systems; Pattern matching; Software quality; Software testing; Text mining; Hadoop; Key phrase extractions; Map-reduce; Pattern-matching technique; Porters; Pre-processing algorithms; Software environments; Unlabeled; Matrix algebra…”
Article -
10
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
11
-
12
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
Get full text
Get full text
Article -
13
Using language-based search in mining large software repositories
Published 2011“…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Improved GART neural network model for pattern classification and rule extraction with application to power systems
Published 2023Subjects:Article -
15
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…In SWAC technique active user's access transaction pattern is matched with user access transaction pattern discovered from user access history based on mining techniques. …”
Get full text
Get full text
Thesis -
16
The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop
Published 2014“…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
Get full text
Get full text
Get full text
Article -
17
A review on classifying and prioritizing user review-based software requirements
Published 2024“…Furthermore, we identified Naive Bayes, SVM, and Neural Networks algorithms as dependable and suitable for requirement classification and prioritization tasks. …”
Get full text
Get full text
Get full text
Article -
18
Using language-based search in mining large software repositories
Published 2011“…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Article -
19
A review on sentiment analysis model Chinese Weibo text
Published 2020“…In word segmentation, related algorithms can be divided into three categories: based on string matching, based on understand and based on statistics [1]. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item
