Search Results - (( java application mining algorithm ) OR ( chain detection method algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- method algorithm »
- chain detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
4
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Based on the analysis, the algorithm of neural network classifier corner detector for FCC was found to have more potentials in terms of accuracy of corner detection and suitability of the chain code. …”
Get full text
Get full text
Thesis -
11
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011“…In the second phase the machine detect any missing data to replace it with correct attribute and dealt with passive narrator chain. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Optimizing high-density aquaculture rotifer Detection using deep learning algorithm
Published 2022“…In this paper, we present the method and performance to detect rotifer Brachionus plicatilis in 1ml sample automatically using deep learning algorithm YOLOv3. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
15
Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga
Published 2022“…Consequently, the techniques for combining existing normalisation methods, namely feature extension, chaining and stacking were proposed in the research. …”
Get full text
Get full text
Get full text
Thesis -
16
Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease
Published 2024“…This aimed to optimize the Light Gradient-Boosting Machine (LightGBM) algorithm to enhance its performance and accuracy in the early detection of CHD, providing a reliable, cost-effective, and non-invasive diagnostic tool. …”
Get full text
Get full text
Get full text
Article -
17
Effect of pre-determined maintenance repair rates on the health index state distribution and performance condition curve based on the Markov Prediction Model for sustainable transf...
Published 2023“…algorithm; detection method; index method; maintenance; management practice; Markov chain; numerical method; numerical model; performance assessment; probability; repair; strategic approach…”
Article -
18
Multiplex real-time PCR detection of respiratory viruses in lower respiratory tract infections in children
Published 2018“…Molecular methods detect more viral aetiologies than conventional methods, with simultaneous detection of multiple respiratory viruses. …”
Get full text
Get full text
Get full text
Article -
19
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
Get full text
Get full text
Article -
20
Survival modelling, missing values and frailty with application to cervical cancer data / Nuradhiathy Abd Razak
Published 2016“…The performance of several methods for handling missing values is studied including the Expectation-Maximization (EM) algorithm by method of weight, hot deck, multiple imputation by chained equation with predictive mean matching (MICE-PMM) and complete case analysis methods for the Weibull data. …”
Get full text
Get full text
Thesis
