Search Results - (( developing theme computational algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- theme computational »
- java implementation »
- developing theme »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Computational Thinking (Algorithms) Through Unplugged Programming Activities: Exploring Upper Primary Students’ Learning Experiences
Published 2021“…These positive themes provide evidence on the appropriateness of employing UPA for teaching the algorithm aspect of CT, particularly for schools located in areas with limited access to adequate technological infrastructure. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Computational Thinking Through Unplugged Programming Activities : Exploring Students’ Learning Experiences
Published 2019“…In the recent year, Computational Thinking (CT) has gained much attention in educational research and practice. …”
Get full text
Get full text
Get full text
Thesis -
12
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
Get full text
Get full text
Get full text
Article -
13
The design for antrophomorphic sociable agent interaction through emotion detection
Published 2003“…Thus, it will give a new direction of human-computer interaction issues in designing the most suitable interface that can understand our behaviour and respond to it Scope of Presentation: Artificial Intelligence, Cognitive Science, Affective Computing, and Human-Computer Interaction.…”
Get full text
Get full text
Conference or Workshop Item -
14
Embodied conversational agents for H5N1 pandemic crisis
Published 2007Get full text
Get full text
Get full text
Article -
15
The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis
Published 2025“…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
Get full text
Get full text
Get full text
Article -
16
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
17
Discrepancy and thematic bibliometric analyses of the remaining limitations in artificial intelligence
Published 2024“…This study has identified underdeveloped and emerging research themes with potential for future development, such as emotion recognition, human-computer interaction, digital health, and situational awareness, which may require further research. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
