Search Results - (( developing emerging practices algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- developing emerging »
- java implementation »
- emerging practices »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Implications of the Middle East Emerging Markets on International Portfolio Diversification
Published 2010“…For the intra-regional investments, the Middle Eastern equity markets provide more portfolio diversification benefits as compared to the emerging and developed equity markets. A vital difference between emerging and developed markets is that developed countries provide the opportunities of selecting the desired investments among a similar set of portfolio risks in both the short and long-term holding periods. …”
Get full text
Get full text
Thesis -
9
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
10
BLAZEBREAKER: GAMIFY THE FLAMES
Published 2024“…This final year project report explores the development and implementation of a Virtual Reality (VR) simulation aimed at enhancing fire drill safety and emergency preparedness, featuring a maze environment filled with intricate pipe structures that take place in a oil refinery. …”
Get full text
Get full text
Final Year Project -
11
Integration of spectroscopy and chemometric analysis for food authentication: a review
Published 2025“…This review will provide a practical framework for researchers seeking to develop a robust predictive system for food authentication using spectroscopy and chemometrics. …”
Get full text
Get full text
Get full text
Article -
12
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review
Published 2023“…Ransomware has emerged as a serious and evolving cybersecurity threat. …”
Get full text
Get full text
Conference or Workshop Item -
13
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
14
Fingerprint frontier: the evolution of biometric security
Published 2023“…Chapter Seven, "Best Practice in Fingerprint Security," emerges as a guiding light, delivering complete methods and procedures for developing and maintaining safe fingerprint systems, with a steadfast dedication to not simply identifying issues but also offering answers. …”
Get full text
Get full text
Get full text
Book -
15
African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
Get full text
Get full text
Student Project -
17
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…Furthermore, this review identifies future research priorities, including the integration of dynamic simulation with real-time optimization, and the development of lifecycle-oriented, comprehensive evaluation systems to address emerging environmental challenges. …”
Get full text
Get full text
Get full text
Article -
18
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…Detecting healthy crops using Python in the context of an analysis project has emerged as an approach that speeds up a process to find out the current state of crops. …”
Get full text
Get full text
Student Project -
19
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…An emergency scenario is an unforeseen situation that threatens human life, and it is related to the emergent movements of evacuees, which is a critical challenge to model as their movements are unpredictable However, such practices provide less concern on how humans move, individual behaviours and individual differences, obstacles and other components. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…An emergency scenario is an unforeseen situation that threatens human life, and it is related to the emergent movements of evacuees, which is a critical challenge to model as their movements are unpredictable However, such practices provide less concern on how humans move, individual behaviours and individual differences, obstacles and other components. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
