No abstract available.
Cited By
- Bailey M A Whirlwind Introduction to Computer Graphics for Complete Beginners ACM SIGGRAPH 2024 Courses, (1-59)
- Sajid F, Hassan M, Khan A, Rizwan M, Kryvinska N, Vincent K, Khan I and Zakarya M (2022). Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing, Scientific Programming, 2022, Online publication date: 1-Jan-2022.
- Çığşar B, Ünal D and Peña A (2019). Comparison of Data Mining Classification Algorithms Determining the Default Risk, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
- Utami N and Surjandari I Identifying Consumer Buying Behavior Differences through Market Basket Analysis in Multiple Outlet Types Proceedings of the International Conference on Business and Information Management, (82-86)
- (2016). Mining balance disorders' data for the development of diagnostic decision support systems, Computers in Biology and Medicine, 77:C, (240-248), Online publication date: 1-Oct-2016.
- Sakr N, ELdesouky A and Arafat H (2016). An efficient fast-response content-based image retrieval framework for big data, Computers and Electrical Engineering, 54:C, (522-538), Online publication date: 1-Aug-2016.
- Almadni D and Abhari A Comparative analysis of classification models in diagnosis of type 2 diabetes Proceedings of the Modeling and Simulation in Medicine Symposium, (1-5)
- Norouzi M, Souri A and Samad Zamini M (2016). A Data Mining Classification Approach for Behavioral Malware Detection, Journal of Computer Networks and Communications, 2016, (1), Online publication date: 1-Mar-2016.
- Ali F, Simoens P, Verbelen T, Demeester P and Dhoedt B (2016). Mobile device power models for energy efficient dynamic offloading at runtime, Journal of Systems and Software, 113:C, (173-187), Online publication date: 1-Mar-2016.
- Sajedi H (2016). Biometric verification by palmprint using contourlet transform, Intelligent Decision Technologies, 10:4, (443-451), Online publication date: 1-Jan-2016.
- Bailey M Fundamentals seminar ACM SIGGRAPH 2015 Courses, (1-129)
- Hsu P, Shen Y and Xie X Predicting Movies User Ratings with Imdb Attributes Rough Sets and Knowledge Technology, (444-453)
- Pachidi S, Spruit M and Van De Weerd I (2014). Understanding users' behavior with software operation data mining, Computers in Human Behavior, 30, (583-594), Online publication date: 1-Jan-2014.
- Cruz J, Bothorel C and Poulet F (2014). Community detection and visualization in social networks, ACM Transactions on Intelligent Systems and Technology, 5:1, (1-26), Online publication date: 1-Dec-2013.
- Di Noia T, Ostuni V, Pesce F, Binetti G, Naso D, Schena F and Di Sciascio E (2013). An end stage kidney disease predictor based on an artificial neural networks ensemble, Expert Systems with Applications: An International Journal, 40:11, (4438-4445), Online publication date: 1-Sep-2013.
- Delen D, Kuzey C and Uyar A (2013). Measuring firm performance using financial ratios, Expert Systems with Applications: An International Journal, 40:10, (3970-3983), Online publication date: 1-Aug-2013.
- Yaakub M, Li Y, Algarni A and Peng B Integration of Opinion into Customer Analysis Model Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03, (164-168)
- Madhavi K, Babu A, Rao A, Raju S and Rau C Graphical method to find optimal cluster centroid for two-variable linear functions of concept-drift categorical data Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (269-274)
- Ozgul F and Erdem Z Detecting Criminal Networks Using Social Similarity Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (581-585)
- Bailey M and Cunningham S Introduction to computer graphics SIGGRAPH Asia 2011 Courses, (1-58)
- Doctor M, Moreno Á, Muñoz P, Díaz D and R-Moreno M Intelligent social networks Proceedings of the International Conference on Web Intelligence, Mining and Semantics, (1-8)
- Jaramillo-Vacio R, Ochoa-Zezzatti A, Jöns S, Ledezma-Orozco S and Chira C Diagnosis of partial discharge using self organizing maps and hierarchical clustering Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I, (91-98)
- Kołodziej M, Majkowski A and Rak R A new method of EEG classification for BCI with feature extraction based on higher order statistics of wavelet components and selection with genetic algorithms Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part I, (280-289)
- Bailey M and Cunningham S Introduction to computer graphics ACM SIGGRAPH ASIA 2010 Courses, (1-100)
- Aburrous M, Hossain M, Dahal K and Thabtah F (2010). Intelligent phishing detection system for e-banking using fuzzy data mining, Expert Systems with Applications: An International Journal, 37:12, (7913-7921), Online publication date: 1-Dec-2010.
- Monedero I, Biscarri F, León C, Guerrero J, Biscarri J and Millán R Using regression analysis to identify patterns of non-technical losses on power utilities Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (410-419)
- Ozgul F, Erdem Z, Bowerman C and Bondy J Combined detection model for criminal network detection Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics, (1-14)
- Zafra A and Ventura S Web usage mining for improving students performance in learning management systems Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part III, (439-449)
- Huang P and Lai Y (2010). Effective segmentation and classification for HCC biopsy images, Pattern Recognition, 43:4, (1550-1563), Online publication date: 1-Apr-2010.
- Wong T and Liu K (2010). A Probabilistic mechanism based on clustering analysis and distance measure for subset gene selection, Expert Systems with Applications: An International Journal, 37:3, (2144-2149), Online publication date: 1-Mar-2010.
- Tsai C and Chen M (2010). Variable selection by association rules for customer churn prediction of multimedia on demand, Expert Systems with Applications: An International Journal, 37:3, (2006-2015), Online publication date: 1-Mar-2010.
- Gul N, Barki I and Akhtar N MFP Proceedings of the 7th International Conference on Frontiers of Information Technology, (1-7)
- HajAbedi Z and Kangavari M A fuzzy-GA wrapper-based constructive induction model Proceedings of the Intelligent computing 5th international conference on Emerging intelligent computing technology and applications, (440-449)
- Tzallas A, Tsipouras M and Fotiadis D (2009). Epileptic seizure detection in EEGs using time-frequency analysis, IEEE Transactions on Information Technology in Biomedicine, 13:5, (703-710), Online publication date: 1-Sep-2009.
- Lev B (2009). Book Reviews, Interfaces, 39:4, (375-379), Online publication date: 1-Aug-2009.
- Lev B (2009). Book Reviews, Interfaces, 39:4, (375-379), Online publication date: 1-Aug-2009.
- Zhang Z, Shi Y and Gao G (2009). A rough set-based multiple criteria linear programming approach for the medical diagnosis and prognosis, Expert Systems with Applications: An International Journal, 36:5, (8932-8937), Online publication date: 1-Jul-2009.
- Ozgul F, Erdem Z and Bowerman C Prediction of past unsolved terrorist attacks Proceedings of the 2009 IEEE international conference on Intelligence and security informatics, (37-42)
- HajAbedi Z A real-coded genetic algorithm for constructive induction Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (2036-2042)
- Xie Y and Yu S (2009). A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Transactions on Networking, 17:1, (54-65), Online publication date: 1-Feb-2009.
- Nassiri-Mofakham F, Nematbakhsh M, Baraani-Dastjerdi A and Ghasem-Aghaee N (2009). Electronic promotion to new customers using mkNN learning, Information Sciences: an International Journal, 179:3, (248-266), Online publication date: 15-Jan-2009.
- Bailey M and Cunningham S Introduction to computer graphics ACM SIGGRAPH ASIA 2008 courses, (1-103)
- Ilic V Interactive Environment Based on Internet Technologies for Psychometric Diagnostics, Psychotherapy and Collaboration Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (248-251)
- Dzitac I and Moisil I Advanced AI techniques for web mining Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems, (343-346)
- Alzate Gaitán G, Useche D and Rodríguez J Prototype of software to support diagnosis for illness through blood samples results Proceedings of the 2008 Euro American Conference on Telematics and Information Systems, (1-4)
- Bailey M Introduction to SIGGRAPH and interactive computer graphics ACM SIGGRAPH 2008 classes, (1-85)
- Zhou X, Zhang D and Jiang Y A new credit scoring method based on rough sets and decision tree Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining, (1081-1089)
- Badawy S, Elragal A and Gabr M Multivariate similarity-based conformity measure (MSCM) Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (314-320)
- Kalita P, Podolak I, Roman A and Bierkowski B Algorithm for intelligent prediction of requests in business systems Proceedings of the 34th conference on Current trends in theory and practice of computer science, (696-707)
- Li Y, Yeh J and Chang C (2008). Isolated items discarding strategy for discovering high utility itemsets, Data & Knowledge Engineering, 64:1, (198-217), Online publication date: 1-Jan-2008.
- Huang Y, McCullagh P, Black N and Harper R (2007). Feature selection and classification model construction on type 2 diabetic patients' data, Artificial Intelligence in Medicine, 41:3, (251-262), Online publication date: 1-Nov-2007.
- Hsu C, Chen C and Su Y (2007). Hierarchical clustering of mixed data based on distance hierarchy, Information Sciences: an International Journal, 177:20, (4474-4492), Online publication date: 1-Oct-2007.
- Wang M, Hsu P, Lin K and Chen S Clustering transactions with an unbalanced hierarchical product structure Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery, (251-361)
- Bailey M and Glassner A Introduction to SIGGRAPH and computer graphics ACM SIGGRAPH 2007 courses, (1-es)
- Arkadan A, Abou-Samra Y and Ramadan Z Radial basis networks for the simulation of stand alone AC generators during no-break power transfer Proceedings of the 2007 Summer Computer Simulation Conference, (237-243)
- Stuart K and Majewski M Selected Problems of Knowledge Discovery Using Artificial Neural Networks Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III, (1049-1057)
- Ni J and Zhang C A Human-Friendly MAS for Mining Stock Data Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (19-22)
- Ai D, Zhang Y, Zuo H and Wang Q Web content mining for market intelligence acquiring from b2c websites Proceedings of the 7th international conference on Web Information Systems, (159-170)
- Guo Q, Chen W, Zhang X, Li Z and Guan D Signal sorting based on SVC & K-means clustering in ESM systems Proceedings of the 13th international conference on Neural Information Processing - Volume Part II, (596-603)
- Liu P, Wu N, Zhu J, Yin J and Zhang W A unified strategy of feature selection Proceedings of the Second international conference on Advanced Data Mining and Applications, (457-464)
- Amasaki S, Hamano Y, Mizuno O and Kikuno T Characterization of runaway software projects using association rule mining Proceedings of the 7th international conference on Product-Focused Software Process Improvement, (402-407)
- Monedero Í, Biscarri F, León C, Biscarri J and Millán R MIDAS Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (725-734)
- Wang T and Lee H Constructing a fuzzy decision tree by integrating fuzzy sets and entropy Proceedings of the 5th WSEAS international conference on Applied computer science, (306-311)
- Yamout F, Oakes M and Tait J Relevance feedback using weight propagation Proceedings of the 28th European conference on Advances in Information Retrieval, (575-578)
- Chen P, Chang K, Hsing T and Chou S Mining criminal databases to finding investigation clues—by example of stolen automobiles database Proceedings of the 2006 international conference on Intelligence and Security Informatics, (91-102)
- Li Y, Yeh J and Chang C Direct candidates generation Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II, (551-560)
- Bailey M Introduction to SIGGRAPH and computer graphics ACM SIGGRAPH 2005 Courses, (1-es)
- Yang H, Zhang M and Shi Z Association-rule based information source selection Proceedings of the 8th Pacific Rim International Conference on Trends in Artificial Intelligence, (563-574)
- Wang H, Chen H and Parrish A Automated selection of auto crash causes Proceedings of the 42nd annual ACM Southeast Conference, (375-378)
- Bunke H Graph-based tools for data mining and machine learning Proceedings of the 3rd international conference on Machine learning and data mining in pattern recognition, (7-19)
Index Terms
- Data Mining: Concepts, Models, Methods and Algorithms
Recommendations
Mining uncertain data
As an important data mining and knowledge discovery task, association rule mining searches for implicit, previously unknown, and potentially useful pieces of information—in the form of rules revealing associative relationships—that are embedded in the ...
Mining fuzzy specific rare itemsets for education data
Association rule mining is an important data analysis method for the discovery of associations within data. There have been many studies focused on finding fuzzy association rules from transaction databases. Unfortunately, in the real world, one may ...
Mining uncertain data for constrained frequent sets
IDEAS '09: Proceedings of the 2009 International Database Engineering & Applications SymposiumData mining aims to search for implicit, previously unknown, and potentially useful pieces of information---such as sets of items that are frequently co-occurring together---that are embedded in data. The mined frequent sets can be used in the discovery ...