Search Results - (( java implementation learning algorithm ) OR ( mining using three algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- three algorithm »
- mining using »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
6
Web usage mining for UUM learning care using association rules
Published 2004“…The enormous content of information on the World Wide Web makes it obvious candidate for data mining research. Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis -
7
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…The enormous of information on the World Wide Web makes it obvious candidate for data mining research. Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
8
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
9
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
10
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The mined frequent patterns are then used in generating association rules. …”
Get full text
Get full text
Thesis -
11
A data mining approach to construct graduates employability model in Malaysia
Published 2011“…Results showed that J48, a variant of decision-tree algorithm performed with highest accuracy, which is 92.3% as compared to the average of 91.3% from other Bayes algorithms. …”
Get full text
Get full text
Get full text
Article -
12
IncSPADE: An Incremental Sequential Pattern Mining Algorithm Based on SPADE Property
Published 2016“…In this paper we propose Incremental Sequential PAttern Discovery using Equivalence classes (IncSPADE) algorithm to mine the dynamic database without the requirement of re-scanning the database again. …”
Get full text
Get full text
Get full text
Book Chapter -
13
An extended ID3 decision tree algorithm for spatial data
Published 2011“…As in the ID3 algorithm that use information gain in the attribute selection, the proposed algorithm uses the spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
Get full text
Get full text
Conference or Workshop Item -
14
Evaluation of data mining models for predicting concrete strength
Published 2024“…The data mining models used in this project are (i) Decision Tree, (ii) AdaBoost, (iii) XGBoost, (iv) Bagging Regressor and (v) Artificial Neural Network. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
16
HYBRID: an efficient unifying process to mine frequent itemsets
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
18
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
19
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Density-based clustering with three clusters outperformed the K-Means algorithm with three clusters in terms of accuracy. …”
Get full text
Get full text
Article -
20
Improved BVBUC algorithm to discover closed itemsets in long biological datasets
Published 2019“…Therefore, this paper proposed a method for computing closure compare with the method used in BVBUC algorithm method. Finally, BVBUC_I is proposed and the performances of these algorithms were evaluated using two synthetic datasets and three real datasets. …”
Get full text
Get full text
Get full text
Article
