- Data Mining Algorithms and Applications
- Rough Sets and Fuzzy Logic
- Fractional Differential Equations Solutions
- Nonlinear Waves and Solitons
- Web Data Mining and Analysis
- Educational Technology and Assessment
- Imbalanced Data Classification Techniques
- Text and Document Classification Technologies
- Data Management and Algorithms
- Face and Expression Recognition
- Tropical and Extratropical Cyclones Research
- Algorithms and Data Compression
- Polynomial and algebraic computation
- Intuitionistic Fuzzy Systems Applications
- Differential Equations and Numerical Methods
- Autonomous Vehicle Technology and Safety
- Peer-to-Peer Network Technologies
- Spam and Phishing Detection
- Fuzzy and Soft Set Theory
- Wireless Sensor Networks and IoT
- Traffic Prediction and Management Techniques
- Network Security and Intrusion Detection
- Multi-Criteria Decision Making
- Nonlinear Photonic Systems
- Advanced Database Systems and Queries
Al-Balqa Applied University
2015-2021
Ajloun National University
2019
Information Technology University
2011
National University of Malaysia
2009
The conformable derivative and adequate fractional complex transform are implemented to discuss the higher-dimensional Ito equation analytically. Jacobi elliptic function method Riccati mapping successfully used for this purpose. New exact solutions in terms of linear, rational, periodic hyperbolic functions wave amplitude derived. obtained entirely new can be considered as a generalization existing results ordinary case. Numerical simulations some with special choices free constants various...
<span lang="EN-US">There has been an increased demand for structured data mining. Graphs are among the most extensively researched structures in discrete mathematics and computer science. Thus, it should come as no surprise that graph-based mining gained popularity recent years. Graph-based methods a transaction database necessary to transform all information into graph form conveniently extract more valuable improve decision-making process. can reveal measure process insights detailed...
For the development of technologies and networks that have been evolving expanding day by day. In this generation, these facilities allow users to interact more efficiently. Safety is therefore very important consider preserving network database need detect a potential attack before an occurs. Network security has become main issue, particularly in industries, there are many techniques be used protect systems. One them called Honeypot, software unauthorized misuse information systems...
Multi-label classification is a general type of that has attracted many researchers in the last two decades due to its applicability modern domains such as scene classification, bioinformatics and text among others. Class labels ranking crucial problem multi-label research because it directly impacts performance final classifiers labels, with high ranks getting higher chance being applied. This paper presents new algorithm called Ranking based on Positive Correlations (MLR-PC). MLR-PC...
Medical databases have accumulated huge amounts of information about patients and their medical conditions.Relationships patterns within these data can provide new knowledge.Sorry to say that few methodologies been developed applied discover this hidden knowledge.In paper, the graph bases association rules mining (data is main part Knowledge Discovery in Databases) used search for relationships a large database.The was collected on 6549 obstetrical were evaluated factors potentially...
Association rules mining (ARM) algorithms have been extensively researched in the last decade. Therefore, numerous were proposed to discover frequent itemsets and then mine association rules. This paper will present an efficient ARM algorithm by proposing a new technique generate from huge set of items, which depends on concepts clustering graph data structure, this be named graph-based rule (CGAR). The CGAR method is create cluster table scanning database only once, transactions into...
The common feature of transaction datasets is that it very huge in size, so important to develop a technique for dataset reduction. process reduction must not change the features original dataset; this will increase effectiveness and efficiency extracting association rules from these without affecting data. Disjoint clusters have different number transactions be introduced order minimize search space, turn decrease time required mine desired by dealing with each cluster individually. support...
In this paper, we introduced some concepts of connectivity in an intuitionistic fuzzy graphs, also study cut vertices and bridges graph. Connectivity complete graphs is studied
Mining association rules is an essential task for knowledge discovery. Past transaction data can be analyzed to discover customer behaviors such that the quality of business decision improved. The approach mining focuses on discovering large itemsets, which are groups items appear together in adequate number transactions. In this paper, we propose a graph-based (DGARM) generate Boolean from database This scans once construct graph and then traverses all itemsets. Practical evaluations show...
A course recommender system has a great importance in expecting the selection of courses by students an university, especially for new who can't easily select proper elective offered specific semester.The computer science department Ajloun University College at Balqa Applied (BAU) will be taken as case study.In this paper, efficient cluster based rule mining algorithm used on database to describe recommendation that assist choose already studied these or some them.
The main goal of cluster analysis is to classify elements into groupsbased on their similarity.Clustering has many applications such as astronomy, bioinformatics, bibliography, and pattern recognition.In this paper, a survey clustering methods techniques identification advantages disadvantages these are presented give solid background choose the best method extract strong association rules.
An improved graph based association rules mining (ARM) approach to extract fromtext databases is proposed in this paper. The text document the technique read only once lookfor terms whose occurrences are greater than some threshold value, these stored a file with theirfrequencies, then they represented as nodes weighted directed where edges represent relationsbetween terms, will denote associations between while edges' weights thestrength or confidence of rules. method called Dynamic Graph...
The main goal of cluster analysis is to classify elements into groupsbased on their similarity. Clustering has many applications such as astronomy, bioinformatics, bibliography, and pattern recognition. In this paper, a survey clustering methods techniques identification advantages disadvantages these are presented give solid background choose the best method extract strong association rules.