Search Results - (( developing formative mining algorithm ) OR ( java application tree algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno by Karno, Md Razib

    Published 2015
    “…The data mining technique was adopted to explore the relationship among statistically patterned and clustered bibliographic data. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Multi-agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Multi agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
    Get full text
    Get full text
    Thesis
  12. 12

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  14. 14

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
    Get full text
    Thesis
  15. 15

    A Systematic Approach to Transform Machine Learning Students� Performance Prediction Model into Preventive Procedures by Khan I., Ahmad A.R., Jabeur N., Mahdi M.N.

    Published 2023
    “…One of the major problems an instructor/institute experiences is the thorough monitoring of students� academic progress, in a course, and instigate preventive procedures to offer additional support to the students with unsatisfactory academic progress. Educational Data Mining tools, specifically Machine learning classifiers, appear supportive to develop prediction models which forecast students� final outcome in a course. …”
    Conference Paper