Search Results - (( java implementation mining algorithm ) OR ( data detection mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- detection mining »
- data detection »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
5
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…There are various data mining tools available to analyze data related android malware detection. …”
Get full text
Get full text
Get full text
Article -
8
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
11
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article -
12
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
13
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
14
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
15
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
16
Detecting Critical Least Association Rules In Medical Databases
Published 2010“…In certain medical data, detecting these rules is very critical and most valuable. …”
Get full text
Get full text
Article -
17
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Get full text
Conference or Workshop Item -
18
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
Get full text
Get full text
Get full text
Thesis -
19
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Research Reports
