Search Results - (( developing work commitment algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- commitment algorithm »
- application mining »
- java application »
- mining algorithm »
- developing work »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Review of the machine learning methods in the classification of phishing attack
Published 2019“…This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.…”
Get full text
Get full text
Get full text
Article -
10
Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse
Published 2024Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Bornean Orangutan nest classification using Image enhancement with convolutional neural network and kernel multi support vector machine classifier
Published 2025“…In future work, we aim to develop orangutan nest detector, contributing to wildlife conservation research.…”
Get full text
Get full text
Get full text
Article -
14
Skyline queries on data with uncertain dimensions for efficient computation
Published 2018“…The performance of SkyQUD-T is studied against two naïve algorithms that are developed to reflect the best-case and worst-case scenarios. …”
Get full text
Get full text
Thesis -
15
Bornean Orangutan Nest Classification using Image Enhancement with Convolutional Neural Network and Kernel Multi Support Vector Machine Classifier
Published 2025“…In future work, we aim to develop orangutan nest detector, contributing to wildlife conservation research.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
