Search Results - (( java implementation mining algorithm ) OR ( data integrator perceptions algorithm ))
Search alternatives:
- integrator perceptions »
- implementation mining »
- perceptions algorithm »
- java implementation »
- mining algorithm »
- data integrator »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim
Published 2024“…This study investigates public sentiment towards AI chatbots, recognizing the critical importance of understanding public perceptions for effective integration. Facing challenges with existing methods, the Support Vector Machine (SVM) algorithm is employed for its proficiency in handling textual data. …”
Get full text
Get full text
Thesis -
9
Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis
Published 2025“…The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
Get full text
Get full text
Get full text
Article -
10
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
Get full text
Get full text
Thesis -
11
Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis
Published 2025“…The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Predicting Customer Behaviour on Buying Life Insurance using Machine Learning
Published 2026journal::journal article -
14
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
15
AI-driven journalism: Examining the impact on news credibility and public trust in The Star
Published 2025“…Ethical concerns, such as algorithmic bias and accountability, also significantly affect trust. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Digital Surface Model (DSM) Construction and Flood Hazard Simulation for Development Plans in Naga City, Philippines
Published 2007“…This paper presents an example of assessing the impact of flood for future developments in Naga City, the Philippines. The elevation data is constructed through integrating various elevation data derived from many sources. …”
Get full text
Get full text
Article -
19
Perceptions and practices of blended learning in foreign language teaching at USIM
Published 2024journal::journal article -
20
A review of automatic driving target detection based on camera and millimeter wave radar fusion technology
Published 2025“…It typically utilizes multiple sensors to achieve comprehensive environmental perception. This review explores advancements in integrating these complementary sensors, focusing on state-of-the-art fusion methods, challenges, and applications. …”
Get full text
Get full text
Get full text
Article
