Search Results - (( java implementation mining algorithm ) OR ( pattern detection gap algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- pattern detection »
- mining algorithm »
- detection gap »
- gap algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article -
9
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
10
A review of visualization techniques for duplicate detection in cancer datasets
Published 2025“…Bridging the gap between technical detection and visual understanding is essential for advancing data-driven healthcare and ensuring high-quality, reproducible outcomes.…”
Get full text
Get full text
Get full text
Article -
11
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
12
Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs)
Published 2023“…This study also attempts to capture a pattern of the most used ANN techniques and algorithms. …”
Article -
13
Enhanced faster region-based convolutional neural network for oil palm tree detection
Published 2021“…Hence, this research aims to close the research gaps by exploring the deep learning-based object detection algorithm and the classical convolutional neural network (CNN) to build an automatic deep learning-based oil palm tree detection and counting framework. …”
Get full text
Get full text
Thesis -
14
An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals
Published 2024“…Despite the advancements in tactile graphic design, a comprehensive understanding of how they explore and interpret raised-line tactile graphics is still lacking. To bridge this gap, this paper introduces a fingertip tracking system employing color marker detection algorithm to investigate the cognitive process of four totally blind participants associated with the Malaysian Association for The Blind (MAB). …”
Get full text
Get full text
Get full text
Article -
15
Robust techniques for linear regression with multicollinearity and outliers
Published 2016“…In addition, although GDFF can detect multiple IO, it has a tendency to detect lesser IO as it should be due to swamping and masking effect. …”
Get full text
Get full text
Thesis -
16
An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals
Published 2024“…Despite the advancements in tactile graphic design, a comprehensive understanding of how they explore and interpret raised-line tactile graphics is still lacking. To bridge this gap, this paper introduces a fingertip tracking system employing color marker detection algorithm to investigate the cognitive process of four totally blind participants associated with the Malaysian Association for The Blind (MAB). …”
Get full text
Get full text
Get full text
Get full text
Article
