Search Results - (( developing ensuring learning algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing ensuring »
- learning algorithm »
- application mining »
- ensuring learning »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…The algorithm undergoes rigorous training with a vast dataset to ensure high prediction accuracy and reliability. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…However, in modern cryptography, the strength of each cryptographic algorithm should only rely on the secret key(s) used to ensure that there is no trap door embedded in the algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Learning style analysis based on Felder-Silverman Index Model using Rule Base algorithm
Published 2024“…To overcome this concern, the Learning Style Analysis System (SAGP) was developed to identify and provide recommendations based on individual learning styles. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Investigating the Performance of Deep Reinforcement Learning-Based MPPT Algorithm under Partial Shading Condition
Published 2024“…Recently, more robust algorithms based on deep reinforcement learning (DRL) have been proposed. …”
Conference Paper -
12
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…The research employs Extreme Programming (XP) methodologies to ensure high-quality code, agility, and collaborative development. …”
Get full text
Get full text
Get full text
Article -
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…Unlike the classical kNN algorithm which is a regression type algorithm, the proposed localisation algorithms utilise machine learning classification for both linear and kernel types. …”
Get full text
Get full text
Thesis -
15
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
Get full text
Get full text
Research Reports -
17
The influence of machine learning on the predictive performance of cross-project defect prediction: empirical analysis
Published 2024“…By leveraging the rich and diverse AEEEEM dataset, this study ensures a comprehensive exploration of algorithmic influences across varied software projects. …”
Get full text
Get full text
Get full text
Article -
18
Artificial Intelligence (AI) in the art and design industry / Fahmi Samsudin
Published 2023“…Addressing these challenges requires the development of policies and regulations to ensure responsible AI development and application. …”
Get full text
Get full text
Get full text
Article -
19
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…Moreover, the inherent limitations of drones, namely constraints on energy consumption, data storage capacity, and processing power, present formidable obstacles in developing collision avoidance algorithms. This review paper explores the challenges of ensuring safe drone operations, focusing on collision avoidance. …”
Get full text
Get full text
Get full text
Article -
20
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
