Search Results - (( pattern mining algorithm ) OR ((( pattern bees algorithm ) OR ( patterns design algorithms ))))
Search alternatives:
- mining algorithm »
- patterns design »
- pattern mining »
- bees algorithm »
-
1
Using unique-prime-factorization theorem to mine frequent patterns without generating tree
Published 2011“…An interest solution is to design an approach that without generating candidate is able to mine frequent patterns. …”
Get full text
Get full text
Get full text
Article -
2
EFP-M2: Efficient model for mining frequent patterns in transactional database
Published 2012“…However, designing an efficient model to mine these patterns is still demanding due to the capacity of current database size. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Data normalization techniques in swarm-based forecasting models for energy commodity spot price
Published 2014“…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis -
5
Web usage mining: A review of recent works
Published 2015“…We provide review of pattern discovery algorithms which utilize association rules, classification and sequential patterns, and since sequential pattern mining is gaining much interest from WUM research community extra emphasis is given to related papers…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Article -
7
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
8
Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms
Published 2023Conference Paper -
9
The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop
Published 2014“…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
Get full text
Get full text
Get full text
Article -
10
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
An extended ID3 decision tree algorithm for spatial data
Published 2011“…It is because spatial data mining algorithms have to consider not only objects of interest itself but also neighbours of the objects in order to extract useful and interesting patterns. …”
Get full text
Get full text
Conference or Workshop Item -
12
Mining Web usage using FRS
Published 2018“…A mining algorithm is introduced using the approach of vertical database. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Intelligent road recognition system for automous vehicle
Published 2013“…The trained system is able to recognize some predetermined road patterns. Further experimental tests are designed to justify the performance of the system settings. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
15
An initial state of design and development of intelligent knowledge discovery system for stock exchange database
Published 2004“…Data mining is a challenging matter in research field for the last few years.Researchers are using different techniques in data mining.This paper discussed the initial state of Design and Development Intelligent Knowledge Discovery System for Stock Exchange (SE) Databases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
Get full text
Get full text
Get full text
Thesis -
17
Study of B40 schoolchildren lifestyles and academic performance using association rule mining
Published 2021“…The analysis framework is established in several stages that involve data collection and processing and transformation, then the design, application and evaluate of the association rules algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Cluster analysis is one of the data mining task that are widely used in many area to extracting, grouping data with similar attribute in order to uncover the hidden pattern and meaning in the data. …”
Get full text
Get full text
Thesis -
19
Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm
Published 2018“…Seven performance indexes were examined to evaluate the performance of the proposed Muskingum model integrated with IBA, with other models that were also based on the Muskingum Model with three-parameters but utilized different optimization algorithms. The results for the Wilson flood showed that the proposed model could reduce the Sum of Squared Deviations (SSD) value by 89%, 51%, 93%, 69%, and 88%, compared to the Genetic Algorithm (GA), Particle Swarm Optimization (PSO) algorithm, Pattern Search (PS) algorithm, Harmony Search (HS) algorithm, and Honey Bee Mating Optimization (HBMO), respectively. …”
Get full text
Get full text
Article -
20
Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi
Published 2013“…Clustering such complex data can discover patterns which have valuable information. Time-series clustering is not only useful as an exploratory technique but also as a subroutine in more complex data mining algorithms. …”
Get full text
Get full text
Thesis
