Search Results - (( development through commitment algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- commitment algorithm »
- development through »
- java implementation »
- through commitment »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Effect of business social responsibility (BSR) on performance of SMEs in Nigeria
Published 2014“…A conceptual framework was developed based on extant literatures and the develop model is based on these BSR constructs Data was collected through hand delivery method by sending questionnaires to 800 SMEs managers/owners. …”
Get full text
Get full text
Get full text
Thesis -
9
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
Optimal economic load dispatch using multiobjective cuckoo search algorithm
Published 2023“…In this paper, Multiobjective Cuckoo Search Algorithm (MOCSA) is developed to solve Economic Load Dispatch (ELD) problem. …”
Article -
11
-
12
Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle
Published 2017“…This study is significant in developing a dynamic committed access rate algorithms line which would benefits the broadband network users.…”
Get full text
Get full text
Thesis -
13
Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse
Published 2024“…This research will be the first to apply algorithmic approach and it will demonstrate that using extremism measure tools developed by the Western academic can be applied to antiIslamic extremist discourse. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse
Published 2024“…This research will be the first to apply algorithmic approach and it will demonstrate that using extremism measure tools developed by the Western academic can be applied to anti-Islamic extremist discourse. …”
Get full text
Get full text
Get full text
Article -
15
Skyline queries on data with uncertain dimensions for efficient computation
Published 2018“…The performance of SkyQUD-T is studied against two naïve algorithms that are developed to reflect the best-case and worst-case scenarios. …”
Get full text
Get full text
Thesis -
16
Characterization of miR-3099-mediated posttranscriptional of target genes regulation during neurogenesis in mice
Published 2019“…In 2011, miR-3099 was found to be expressed as early as in the blastocyst stage, in which the expression was maintained until the developing E11.5 mouse brain. The expression of miR-3099 was further restricted to the cortical plate of the developing mouse brain between E13.5 and E17.5, coinciding with the time that the majority of the cells are committed to neuronal cell lineage. …”
Get full text
Get full text
Thesis -
17
