Search Results - (( java application during algorithm ) OR ( model visualization mining algorithm ))
Search alternatives:
- visualization mining »
- model visualization »
- application during »
- java application »
- during algorithm »
- mining algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
3
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…This research project is to enhanced predictive crime mapping model with data mining technique to predict the possible rate of crime occurrence. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Stock price monitoring system
Published 2024“…As stock price is time series data, a time series prediction algorithm is being utilized to build a deep learning model, namely Long Short-Term Memory (LSTM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Application of terrain analysis to the mapping and spatial pattern analysis of subsurface geological fractures of Kuala Lumpur limestone bedrock, Malaysia.
Published 2012“…The first involves geological prediction and visual interpretation of terrain parameters using a digital elevation model (DEM). …”
Get full text
Get full text
Article -
6
Decision Tree: Customer churn analysis for a loyalty program using data mining algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
7
The implementation of market basket analysis in menu association model for Corm Café / Nur Amalina Kamarulzaman
Published 2018“…To find the frequent item mining, the researcher had proposed some efficient algorithm which is FP-Growth. …”
Get full text
Get full text
Thesis -
8
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
9
Application of target detection method based on convolutional neural network in sustainable outdoor education
Published 2023“…The model can recognize underwater organisms local, global, and visual features. …”
Get full text
Get full text
Article -
10
-
11
-
12
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…This semantic technology is chosen due to the ability to mine, interpret and organise the knowledge. Ontology can be seen as a knowledge base that can be used to improve the image retrieval process with the aim of reducing the semantic gap between visual features and high-level semantics. …”
Get full text
Get full text
Thesis -
13
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…The first objective of this study is to improve a new algorithm technique for classification. The new algorithm come from a combination of an ideas of k-NN algorithm and ensemble concept. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
