Search Results - (( pattern using algorithm ) OR ( patterns ((graph algorithm) OR (acs algorithm)) ))

Refine Results
  1. 1
  2. 2

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis by Kabir Ahmad, Farzana, Kamaruddin, Siti Sakira, Yusof, Yuhanis, Yusoff, Nooraini

    Published 2021
    “…For learning and predicting the event patterns, dynamic Bayesian network (DBN) with Hidden Markov Model (HMM) and heuristic search learning algorithms have been a popular technique used in which structure learning is trained to classify complex events pattern. …”
    Get full text
    Get full text
    Monograph
  4. 4
  5. 5

    The application of voltage sags pattern to locate a faulted section in distribution network by Mokhlis, Hazlie, Li, H.Y., Khalid, A.R.

    Published 2010
    “…This paper proposes an alternative automated fault location algorithm to locate a faulted section in distribution network using only voltage sag data monitored at the primary substation. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida by Nanyonga , Aziida

    Published 2019
    “…Combinations of feature selection and classification algorithms were used for mortality prediction post ACS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An improved ACS algorithm for data clustering by Mohammed Jabbar, Ayad, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2020
    “…To improve the ACOC, this study proposes a modified ACOC, called M-ACOC, which has a modification rate parameter that controls the convergence of the algorithm. Comparison of the performance of several common clustering algorithms using real-world datasets shows that the accuracy results of the proposed algorithm surpasses other algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Scalability and performance in duplicate detection : relational vs. graph database by Muhammad Farhad, Khaharruddin

    Published 2023
    “…This approach enables the discovery of intricate patterns and the management of vast datasets. This study assesses scalability and algorithms performance available on prevalent graph database systems for identifying duplicate customer data within these databases. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Xilinx (FPGA) design for single phase DC-AC matrix converter with sinusoidal pulse width modulation (SPWM) / Mohd Raduan Md Adam by Md Adam, Mohd Raduan

    Published 2003
    “…One sine waveform with one carrier waveforms is used to generate the PWM. The PWM pattern proposes occupies less FPGA block cell hence more space could be used for other control algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    WebPUM : a web-based recommendation system to predict user future movements. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2010
    “…The approach is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining phase. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…Specialized methods for specific domains have emerged to satisfy various needs in discovering rare patterns in text. This paper focuses on a graph-based approach for text representation and presents a novel error tolerance dissimilarity algorithm for deviation detection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Characterization of Pattern for Predicting Ultra Violet (UV) Effects in Environment Data Management System (EDMS) by M. Amir Abas, M. Dahlui, UniKL BMI

    Published 2013
    “…The result of the measurement exercises produced various patterns, each with unique identification for developing database pattern algorithm. …”
  15. 15

    High performance hierarchical torus network by Rahman, M.M. Hafizur, Shah, Asadullah, Inoguchi, Yasushi

    Published 2012
    “…The static network performances are derived from the graph model and the DCP is evaluated by using dimension-order routing and newly proposed adaptive routing algorithms under various traffic patterns. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques by Ng, Jiun Shen

    Published 2022
    “…This project is about predicting energy consumption patterns based on trending videos on YouTube 2021 by using machine learning techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    A Fast Scheduling Algorithm for WDM Optical Networks by Cheah, Cheng Lai

    Published 2000
    “…The algorithm employs a theory in graph, known as edge colouring of bipartite multigraph to produce the transmission schedule, which is free from collision due to the nature of the edge colouring. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…The utilization of data that is assembled by Web Usage Mining gives the organizations the capacity to deliver results more compelling to their organizations and expanding of sales. Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20