Search Results - (( database application usage algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- database application »
- application mining »
- application usage »
- java application »
- mining algorithm »
- usage algorithm »
-
1
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
2
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
-
5
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
-
10
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015Get full text
Get full text
Conference or Workshop Item -
11
Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database
Published 2011“…The emergence of Web-Driven Database Applications (WDDA) has helped fulfil this requirement. …”
Get full text
Get full text
Research Reports -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
Published 2019“…This paper present load balancing technique in a heterogeneous environment allows the usage for geographically widely distributed and multi-owner resources to solve large-level application, usage of load balancing algorithms was important to keep maintaining the balance of workload between emerged infrastructures like grid. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…The data are reposited to a secondary storage for future usage. Therefore, a relational database (RDB) is most commonly used as a backbone in most application software for organising such data into structured form. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Shuffling algorithms for automatic generator question paper system.
Published 2010Get full text
Get full text
Article -
20
Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase
Published 2004“…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
