Search Results - (( its implementation mining algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- implementation mining »
- its implementation »
- mining algorithm »
- java application »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
Get full text
Conference or Workshop Item -
3
Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems
Published 2023“…In this paper, we present our proposed algorithm to detect the obligation and prohibition norms which we called the Obligation and Prohibition Norms Mining algorithm (OPNM). …”
Conference paper -
4
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
5
Training functional link neural network with ant lion optimizer
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
7
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
8
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
11
Analysis using data mining techniques: the exploration and review data of diabetes patients / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2025“…These trends are not only enhancing the efficiency and accuracy of data mining but also expanding its applications across different industries. …”
Get full text
Get full text
Get full text
Article -
12
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
Feature selection in intrusion detection, state of the art: A review
Published 2016“…Network anomaly detection methods are implemented using different approaches including machine learning, data mining, and many more. …”
Get full text
Get full text
Article -
15
Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat
Published 2012“…This project can be used for marketing area because of the data was about review on I- phone. Nevertheless, it’s only accepts English standard word. In order to achieve the main objective, five phases of methodology was been implemented which are preliminary study, data preparation, model development, model evaluation & prototype development and last but not list is documentation. …”
Get full text
Get full text
Thesis -
16
An improved pheromone-based kohonen self-organising map in clustering and visualising balanced and imbalanced datasets
Published 2021“…However, similar to other clustering algorithms, this algorithm requires sufficient data for its unsupervised learning process. …”
Get full text
Get full text
Get full text
Article -
17
An Improved Pheromone-Based Kohonen Self- Organising Map in Clustering and Visualising Balanced and Imbalanced Datasets
Published 2021“…However, similar to other clustering algorithms, this algorithm requires sufficient data for its unsupervised learning process. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
19
Storage Space Optimisation for Green Data Center
Published 2013“…The initial results of the implementation of the model that is necessary in designing a complete space optimization algorithm are presented.…”
Get full text
Get full text
Article -
20
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
Get full text
Get full text
Get full text
Get full text
Article
