Search Results - (( developing agent detection algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- developing agent »
- mining algorithm »
- agent detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
7
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
Conference Paper -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
12
-
13
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
Get full text
Get full text
Thesis -
14
The design for antrophomorphic sociable agent interaction through emotion detection
Published 2003Get full text
Get full text
Conference or Workshop Item -
15
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
Get full text
Get full text
Thesis -
16
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…In this paper we present three software-based agents built using kernel machines to perform automated, real-time intruder detection in surveillance systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…If voice quality degradation is detected, then the agent performs further rate adaptation to improve the quality. …”
Get full text
Get full text
Thesis -
18
A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control
Published 2014“…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
Get full text
Get full text
Conference or Workshop Item -
19
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
Get full text
Get full text
Thesis -
20
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article
