Search Results - (( data information context algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- information context »
- context algorithm »
- implication based »
- data information »
- java implication »
-
1
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…On top of a well-rounded multifaceted algorithm, this work contributes a much needed research framework for this context with a test-bed of data that must make future research endeavors more convenient. …”
Get full text
Get full text
Thesis -
2
-
3
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
5
-
6
A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences
Published 2025“…E-tour guides are digital tools like apps or websites that inform tourists about their destination. In this context, recommendation systems and information dissemination are closely related. …”
Get full text
Get full text
Get full text
Thesis -
7
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The Uncertain Data Stream (UDS) utilized for query processing can provide challenges in many technical contexts owing to its inherent inconsistency, ambiguity, and time delay in interpreting information. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Get full text
Article -
9
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Article -
10
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
Get full text
Get full text
Article -
11
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
Get full text
Get full text
Article -
12
Social networks content analysis for peacebuilding application
Published 2015“…The proposed framework shows that twitter is most popular SN for Pb CA purpose and proposed framework presents the searching criteria and custom filters to extract the topic specific data. Moreover, the research proposes to use lexical analysis (LA) method to extract the SNs features, 1st order context representation (CR) technique to represent the context of the extracted features, DBSCAN clustering algorithm for data management by making different clusters, ranking algorithm, Log likelihood ratio and SVM techniques for content analysis and classification. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Construction and optimization of financial risk management model based on financial data and text data influencing information system
Published 2024“…Westudy how textual data aids financial risk management algorithms' risk prediction. …”
Get full text
Get full text
Get full text
Article -
14
New Evolving Fuzzy System Algorithms Using Dynamic Constraint
Published 2016Get full text
Get full text
Thesis -
15
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…Introduction: The role of social media in providing fitness-related health information has been widely discussed; however, there is a notable lack of research on fitness-related health information behaviors among youth within the social media context. …”
Get full text
Get full text
Get full text
Article -
16
Clustering Student Performance Data Using k-Means Algorithms
Published 2023“…The research approach known as educational data mining (EDM) focuses on using data mining techniques to extract massive data from the educational context and transform it into knowledge that can improve educational systems and decisions. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. …”
Get full text
Get full text
Article -
18
Data Classification and Its Application in Credit Card Approval
Published 2004“…In this context, data mining has arisen as an important research area that helps to reveal the hidden useful information from the raw data collected. …”
Get full text
Get full text
Final Year Project -
19
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…Analyzing unstructured gain data has been a growing interest among researchers, resulting in valuable information in many fields such as path planning and motion control. …”
Get full text
Get full text
Get full text
Article -
20
