Search Results - (( java application mining algorithm ) OR ( java relational data algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- java relational »
- relational data »
- data algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
Get full text
Get full text
Thesis -
2
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. …”
Get full text
Get full text
Thesis -
12
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. We collect information on 23 asthma-related characteristics. …”
Get full text
Get full text
Get full text
Article -
13
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
14
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. We collect information on 23 asthma-related characteristics. …”
Get full text
Get full text
Get full text
Article -
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
Get full text
Get full text
Get full text
Article
