Search Results - (( future solution mining algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- mining algorithm »
- java application »
- future solution »
- solution mining »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Optimizing OLAP heterogeneous computing based on Rabin-Karp algorithm
Published 2013“…In the light of our results; we present the achieved gain and possible future trends. Keywords— OLAP, heterogeneous computing, Rabin-Karp, data mining, pattern recognition.…”
Get full text
Get full text
Get full text
Proceeding Paper -
10
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009Get full text
Get full text
Conference or Workshop Item -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
A comparative analysis of software engineering approaches for sequence analysis
Published 2013“…The sequences contain the precious information that needs to be mined for useful purposes. There is high concentration required to model the optimal solution. …”
Get full text
Get full text
Book -
13
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
15
Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour
Published 2022“…An absolute majority of base algorithms for this problem were nature-inspired and population-based metaheuristics extended to complementary methods in hybrid solutions. …”
Get full text
Get full text
Get full text
Thesis -
16
Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks
Published 2023“…This new development of the Hopfield network with the 3-Satisfiability logic presents a viable strategy for logic mining applications in future.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Classification models for higher learning scholarship award decisions
Published 2018“…In this study, a data mining approach was used to propose a classification model of scholarship award result determination. …”
Get full text
Get full text
Get full text
Article -
20
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis
