On extraction of Nutritional Patterns (NPS) using fuzzy association rule mining
(2008)
Presentation / Conference Contribution
Dr Maybin Muyeba's Outputs (34)
Weighted association rule mining from binary and fuzzy data (2008)
Presentation / Conference Contribution
A novel approach is presented for mining weighted association rules (ARs) from binary and fuzzy data. We address the issue of invalidation of downward closure property (DCP) in weighted association rule mining where each item is assigned a weight acc... Read More about Weighted association rule mining from binary and fuzzy data.
Mining fuzzy association rules from composite items (2008)
Presentation / Conference Contribution
This paper presents an approach for mining fuzzy Association Rules (ARs) relating the properties of composite items, i.e. items that each feature a number of values derived from a common schema. We partition the values associated to properties into f... Read More about Mining fuzzy association rules from composite items.
Fuzzification of spiked neural networks (2008)
Presentation / Conference Contribution
Biological systems are slow, wide and messy whereas computer systems are fast, deep and precise. Fuzzy neural networks use fuzzy logic to implement higher level reasoning and incorporate expert knowledge into the system while neural networks deal wit... Read More about Fuzzification of spiked neural networks.
A weighted utility framework for mining association rules (2008)
Presentation / Conference Contribution
Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of occurrence in a record i.e. their weight and utility is the same (weight=... Read More about A weighted utility framework for mining association rules.
Threat Modeling Revisited: Improving Expressiveness of Attack (2008)
Presentation / Conference Contribution
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing techniques lack adequate semantics and expressiveness. This paper revi... Read More about Threat Modeling Revisited: Improving Expressiveness of Attack.
A Method for Web Information Extraction (2008)
Presentation / Conference Contribution
The Word Wide Web has become one of the most important information repositories. However, information in web pages is free from standards in presentation and lacks being organized in a good format. It is a challenging work to extract appropriate and... Read More about A Method for Web Information Extraction.
Query coordination for distributed data sharing in P2P networks (2007)
Presentation / Conference Contribution
Organisations often store information about the same entity objects or features in different formats. Accessing and integrating this distributed information can be a difficult task because of schema differences and database platform issues. In this p... Read More about Query coordination for distributed data sharing in P2P networks.
A Model for Data Management in Peer-to-Peer Systems (2007)
Journal Article
With the current growth in Peer-to-Peer (P2P) computing, data management in P2P systems has become a very important issue, yet from literature little research effort has been dedicated to this field. Data management in P2P systems covers a wide range... Read More about A Model for Data Management in Peer-to-Peer Systems.
An algorithm to mine general association rules from tabular data (2007)
Presentation / Conference Contribution
Mining association rules is a major technique within data mining and has many applications. Most methods for mining association rules from tabular data mine simple rules which only represent equality in their items. Limiting the operator only to “=”... Read More about An algorithm to mine general association rules from tabular data.
On clustering attribute-oriented induction (2007)
Presentation / Conference Contribution
Conceptual clustering forms groups of related data items using some distance metrics. Inductive techniques like attribute-oriented induction AOI) generate meta-level descriptions of attribute values without explicitly stated distance metrics and over... Read More about On clustering attribute-oriented induction.
Towards Healthy Association Rule Mining (HARM): A fuzzy quantitative approach (2006)
Book Chapter
Association Rule Mining (ARM) is a popular data mining technique that has been used to determine customer buying patterns. Although improving performance and efficiency of various ARM algorithms is important, determining Healthy Buying Patterns (HBP)... Read More about Towards Healthy Association Rule Mining (HARM): A fuzzy quantitative approach.
A framework for post-rule mining of distributed rule bases (2005)
Presentation / Conference Contribution
Extending attribute-oriented induction as a key-preserving data mining method (1999)
Presentation / Conference Contribution
Attribute-Oriented Induction (AOI) is a set-oriented data mining technique used to discover descriptive patterns in large databases. The classical AOI method drops attributes that possess a large number of distinct values or have either no concept hi... Read More about Extending attribute-oriented induction as a key-preserving data mining method.