Search Results - (( developing sharing detection algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- developing sharing »
- sharing detection »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010“…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
Get full text
Get full text
Conference or Workshop Item -
9
Monkeypox disease detection using Convolutional Neural Network (CNN) / Nur Farhain Humaira Ghanami
Published 2024“…The project is to study the CNN algorithm and develop a prototype to evaluate the accuracy of monkeypox disease detection using CNN. …”
Get full text
Get full text
Thesis -
10
-
11
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. …”
Get full text
Get full text
Thesis -
12
Student resource exchange: a web-based system for sharing educational resources among students
Published 2025“…This project focuses on the development of the Student Resource Exchange, a web-based platform designed to enhance the sharing and accessibility of educational resources among students. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
Get full text
Get full text
Thesis -
14
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
15
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
16
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Moreover, for the proposed SBD algorithm, a comparative study is performed with state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The increasing affordability of powerful processors and memory chips, availability of real-time operating systems, low complexity intelligent algorithms and the coming-of-age of system development software are the key factor that makes this development possible. …”
Get full text
Thesis -
18
An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing
Published 2014“…The images obtained from MIVIA dataset has been manually segmented to cell level from the image level. Developing an automated segmentation algorithm might give better results.…”
Get full text
Get full text
Final Year Project -
19
Improving malicious detection rate for Facebook application in OSN platform
Published 2018“…Our key contribution in this part is in developing malware detection in Facebook third party application by using Naïve Bayes algorithm technique .We identify a set of features that help us distinguish malicious apps from benign ones. …”
Get full text
Get full text
Thesis -
20
Fakebuster: fake news detection system using logistic regression technique in machine learning
Published 2019“…In this study, Logistic Regression was applied in detecting fake news. Model development methodology is referenced and followed in this project. …”
Get full text
Get full text
Article
