Search Results - (( _ segmentation mining algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- segmentation mining »
- data normalization »
- mining algorithm »
- java »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
3
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Two algorithms were investigated in this paper one is frontier based random search algorithm and the second is efficient algorithm based on segmentation strategy. …”
Get full text
Get full text
Get full text
Article -
4
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
Get full text
Get full text
Conference or Workshop Item -
5
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…On the other hand, trajectories preprocessing such as segmentation and noise points filtering is a vital step which precedes the mining task. …”
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
7
-
8
Denoising histological images for a better colour image segmentation / Sulastri Putit
Published 2013“…In this study, the de-noising concept for colour image preprocessing and segmentation are proposed since these two processes has been widely accepted as an important component of the image mining in order to enhance the images.…”
Get full text
Get full text
Thesis -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…However, these approaches involve complex algorithms and require voluminous dataset as the training model. …”
Get full text
Get full text
Monograph -
11
Intuitive Content Management System to Preferences Template Throughout Data Collection by using Data Mining Classification of Prediction Method
Published 2016“…The sophisticated mathematical algorithm applies in data mining to segment data and evaluates the probability of a future event. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
13
Data mining and analysis for predicting electrical energy consumption
Published 2024“…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
Article -
14
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
15
-
16
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
19
MODELLING ANALYSIS FOR ACCURATE TROPICAL WEATHER FORECASTING
Published 2023“…Over the last decade, numerous research have attempted to enhance rainfall prediction accuracy by improving and merging data mining methodologies. In this research, the Random Forest, K-Nearest Neighbors, Support Vector Machines, XGBoost and Naïve Bayes algorithm are used to forecast rainfall. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
