Search Results - (( some applications based algorithm ) OR ( _ application mining algorithm ))*

Refine Results
  1. 1

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Rule pruning techniques in the ant-miner classification algorithm and its variants: A review by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2018
    “…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…In the online phase, the stream clustering algorithm for trajectories based on the lifespan of the cluster is proposed (CC_TRS) to overcome the limitations of the time window technique. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Context aware app recommendation using email semantic analysis by Tang, Zi Cong

    Published 2019
    “…In order to increase the functionalities for the email application and further enhance the user experien ce, it is proposed to develop a recommendation system to work with the email application that provide s a recommendation based on the email content. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…The idea was incorporated into a new algorithm called, k-Approximate Modal Haplotypes (&-AMH) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour by Hadi , Naghavipour

    Published 2022
    “…An absolute majority of base algorithms for this problem were nature-inspired and population-based metaheuristics extended to complementary methods in hybrid solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Classification models for higher learning scholarship award decisions by Wirawati Dewi Ahmad, Azuraliza Abu Bakar

    Published 2018
    “…Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
    Get full text
    Get full text
    Get full text
    Article