Search Results - (( developing formative content algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing formative »
- application mining »
- formative content »
- content algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
-
8
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The letter document has their own format, which consists of many parts. The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. …”
Get full text
Get full text
Research Reports -
11
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
Get full text
Get full text
Get full text
Article -
12
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The letter document has their own format, which consists of many parts. The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. …”
Get full text
Get full text
Research Reports -
13
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
14
An analysis of hateful contents detection techniques on social media
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
15
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
16
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…This is accomplished through modification of the technique employed by [1] to fit Hausa NSWs' formation. It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.]
Published 2022“…Content-based recommendation algorithm is implemented into the system as it can recommend the best skill content suitable for a job application. …”
Get full text
Get full text
Get full text
Book Section -
18
Classification model for chlorophyll content using CNN and aerial images
Published 2024“…The regression model will predict the chlorophyll content in number format, which requires experts to analyse the outcome. …”
Get full text
Get full text
Get full text
Article -
19
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
20
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
