Search Results - (( developing interactive prevention algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- developing interactive »
- implementation mining »
- prevention algorithm »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Development of an effective clustering algorithm for older fallers
Published 2022“…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
Get full text
Get full text
Article -
9
Development of efficient t-way test data generation algorithm and execution strategies
Published 2012“…R2Way outperforms other existing strategies but cannot support higher interaction level (T > 2). And finally, (IV) MTTG (Multi-Tuple based T-way Test Data Generation) strategy is developed inspiring kids “Card Game” to overcome the limitations of interaction strength. …”
Get full text
Get full text
Thesis -
10
Accident Prevention Block to Move an Automobile From Traffic Collision
Published 2019“…In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
Get full text
Get full text
Get full text
Article -
11
All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.]
Published 2014“…In a later stage of this project, we could quantify the risk factors for ADR and drug interaction and develop a predictive model which links drug interaction with ADR.…”
Get full text
Get full text
Get full text
Book Section -
12
Crowd behavior monitoring using self-adaptive social force model
Published 2019“…This work aims to develop a crowd behavior monitoring system using Self-Adaptive SFM. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
14
3D Face Analysis using Tensor Approach
Published 2022“…Early studies in face research used matrix-based and vector-based algorithms to represent faces. According to studies, these methods have the potential to prevent the loss of critical and significant data, which could lead to lower recognition performance. …”
Get full text
Get full text
Thesis -
15
A conceptual anonymity model to ensure privacy for sensitive network data
Published 2021“…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Monitoring cathodic protection system for underground pipeline
Published 2013“…In this research, a software algorithm is created to be able to sense the readings of drain point, shunt current, transformer rectifier voltage, temperature, humidity and to response to multiple levels of CP malfunctions using interactive graphical method and mapping system. …”
Get full text
Get full text
Thesis -
17
Depression Detection in Tweets from Urban Cities of Malaysia using Deep Learning
Published 2021“…Therefore, the research entails on how the problem statement of this project on developing an algorithm that can predict text- based depression symptoms using deep learning and Natural Language Processing (NLP) can be achieved. …”
Get full text
Get full text
Conference or Workshop Item
