Search Results - (( java evaluation technique algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- evaluation technique »
- java implementation »
- mining algorithm »
- java evaluation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. Empirical evaluation was conducted to evaluate the proposed Hybrid Obfuscation Technique. …”
Get full text
Get full text
Thesis -
10
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
Get full text
Get full text
Article -
11
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
Get full text
Get full text
Thesis -
12
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
13
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
14
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
Get full text
Get full text
Get full text
Article -
15
-
16
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
Get full text
Get full text
Thesis -
17
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…As the data are extremely imbalanced, Adaptive Synthetic (ADASYN) resampling technique was picked to balance the data between two classes, i.e., landslide and non-landslide. …”
Conference Paper -
18
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The proposed system is then designed and developed using Java programming language. The performance of the proposed system is evaluated in a two-floor building using offthe- shelf WLAN access points and client device. …”
Get full text
Get full text
Thesis -
19
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. The performance of KSFaci is evaluated using a four-factor evaluation metrics covering the user profile preciseness, recommendation service, staff directory and document repository. …”
Get full text
Get full text
Thesis -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
