Search Results - (( developing detection mining algorithm ) OR ( java application server algorithm ))
Search alternatives:
- developing detection »
- application server »
- detection mining »
- mining algorithm »
- java application »
- server algorithm »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
2
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
3
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
4
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
5
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
6
-
7
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
8
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
11
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. …”
Get full text
Get full text
Get full text
Thesis -
13
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
17
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
18
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
19
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
20
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…Additionally, the proposed framework also can detect the attack simultaneously using text mining approaches.…”
Get full text
Get full text
Get full text
Get full text
Thesis
