Search Results - (( developing information seeking algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing information »
- information seeking »
- application mining »
- seeking algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…Our research presents a method for this study, which involves hiding digital images with color at a depth of 24 bits. Through the development of a system to improve the security and confidentiality of data in the form of critical messages, this study seeks to provide senders with solutions. …”
Get full text
Get full text
Get full text
Article -
9
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…Hence, this study aims to develop the dynamic configuration algorithm to provide an optimal support assignment based on information generated from both social support recipient and provision computational models. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Based on this research, the objectives to be achieved are to identify IP Address of anonymous tracker, to locate IP Address where anonymous tracker location and comparison of anonymous tracker algorithms. The research metodology consists of several steps consists of gathering information, data collection, data analysis and system development and finally result analysis. …”
Get full text
Get full text
Thesis -
11
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Robust Image Watermarking Theories and Techniques: A Review
Published 2014Get full text
Get full text
Get full text
Article -
13
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
Article -
14
A review on classifying and prioritizing user review-based software requirements
Published 2024“…Additionally, an updated matrix taxonomy has been developed based on a combination of definitions from various studies to classify user reviews into four main categories: information seeking, feature request, problem discovery, and information giving. …”
Get full text
Get full text
Get full text
Article -
15
Assisting novice researchers in utilizing the web as a platform for research: Semantic approach
Published 2023“…Support in the early stage of study is crucial for novice researchers as it will give them some insights of where to seek for extra information based on institutions, people and research trend without having to go through tedious process of identifying this information all by themselves. …”
Article -
16
Assisting novice researchers in utilizing the web as a platform for research: semantic approach
Published 2009“…Support in the early stage of study is crucial for novice researchers as it will give them some insights of where to seek for extra information based on institutions, people and research trend without having to go through tedious process of identifying this information all by themselves. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Stress mental health symptom assessment mobile application for young adults
Published 2023“…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Investigation of the optimal sensor location and classifier for human motion classification
Published 2022“…In addition, this study seeks to find the best classification algorithm for human daily activities. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
