Search Results - (( data processing re algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- processing re »
- re algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Segmentation of MRI brain images using statistical approaches
Published 2011“…Moreover, three improvements of EM for brain MRI segmentation are proposed, which incorporate neighbourhood information in a new manner in the clustering process. In addition, two algorithms for the post-processing of clustering results using user-interaction and the re-evaluation of boundary data in each cluster are presented. …”
Get full text
Get full text
Thesis -
8
Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks
Published 2019“…Nodes with higher residual energy and RSSI than the threshold are selected as the CHs which continue operating as CHs until their residual energy is lower than the threshold. This reduces the re-election and re-clustering processes which lowers the network energy consumption. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Framework development in extracting rules from trained neural network / Shuzlina Abdul Rahman, Azlinah Hj Mohamed and Marina Yusoff
Published 2006“…In addressing this framework, the criteria of each approaches has been explored and analyzed from eight factors: process extraction, merit, demerit, rule type, type of data, rule quality, processing complexity, and the description of each RE technique. …”
Get full text
Get full text
Research Reports -
11
-
12
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…A study found that the visualization tools nowadays are not free, and it is expensive, so this system will help CoRe department in visualizing data. This project software development process used an agile model SDLC to develop the system. …”
Get full text
Get full text
Thesis -
13
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021“…Meanwhile, the re�sult of abnormal heart convergence process has the lowest convergence value of 0.49 and the highest convergence value of 0.87. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease
Published 2019“…This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. A performance evaluation of the improved algorithm was carried out against the traditional C4.5 Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
16
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Therefore, the research attempts to modify GWO to addresses the limitation of GWO for improvement of exploration by strengthen the searching process via several random leaders in each iteration, re-generating the random leaders in each iteration and introducing archive to verify the solution with better probability to proceed further for training and re-generation. …”
Get full text
Get full text
Thesis -
17
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
Get full text
Get full text
Thesis -
18
IDSA: an efficient algorithm for skyline queries computation on dynamic and incomplete data with changing states
Published 2021“…Data incompleteness causes several challenges on skyline queries such as losing the transitivity property of the skyline technique and the test dominance process between tuples being cyclic. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
20
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…The randomness of Enhanced 3D-AES then is re-evaluated and it has passed all 15 statistical tests for all seven data categories. …”
Get full text
Get full text
Thesis
