Search Results - (( developing human context algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- context algorithm »
- developing human »
- mining algorithm »
- human context »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI
Published 2026“…Synthesizing these findings, we propose a "Context- Aware AI Fairness Framework," a holistic, lifecycle approach structured around four pillars: (1) Foundational Scoping & Participatory Design, (2) Data Governance & Bias-Aware Data Management, (3) Contextualized Model Development & Mitigation, and (4) Human-in-the-Loop Deployment & Continuous Monitoring. …”
Get full text
Get full text
Get full text
Article -
9
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…Consolidation of this theory with other procedures such as risk assessment and text mining has produced a model namely as Risk Concentration for Context Assessment or RiCCA. This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
10
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…In this context, recently developed engines such as FPT.AI serves well local customers since it supports well the national language. …”
Get full text
Get full text
Conference or Workshop Item -
11
Algorithm for the legal regulation of internet financial crime
Published 2024Get full text
Get full text
Get full text
Article -
12
Automate customer support handling E-Commerce enquiry using ChatGPT
Published 2024“…The project scope is the development of a comprehensive mechanism for context handling, an inconspicuous human takeover process, and the summarization of entire conversations between customers and automated customer support before handover to human agents. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Widespread research on activity recognition is becoming an imperative topic for improving the quality of human health. The fast development of sensing technology has become a fundamental platform for researchers to implement a system that could fulfill human needs. …”
Get full text
Get full text
Get full text
Article -
14
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The experimental results show that the proposed algorithm achieved acceptable results in comparison to human judgment. …”
Get full text
Get full text
Thesis -
15
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…In summary, the study develops algorithms for accurate image quality prediction, refining images, and enhancing visual quality. …”
Get full text
Thesis -
16
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
17
Wifi-based location-independent human activity recognition and localization using deep learning
Published 2024“…The fusion contributes to the development of reliable and adaptable HAR systems across varying environmental contexts. …”
Get full text
Get full text
Get full text
Thesis -
18
Jawi recognition system
Published 2010“…The aim of this research is to develop software that able to recognize Jawi character. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Evaluating Power Reliability Dedicated for Sudden Disruptions: Its Application to Determine Capacity on the Basis of Energy Security
Published 2018“…Given that a continuous power supply is fundamental to the economy and human well-being, development of a self-sustained electrical systemthat can withstand sudden disturbances by employing both renewable energy and storage technology is of significant importance. …”
Get full text
Get full text
Article -
20
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…Furthermore, only two patterns were used.In this thesis, context-based word recognition learning system was developed. 6 words that need context-based recognition function for the words to be recognized were chosen. …”
Get full text
Get full text
Thesis
