Search Results - (( java implementation mining algorithm ) OR ( pattern evaluation tool algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- pattern evaluation »
- mining algorithm »
- evaluation tool »
- tool algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Characterization of Pattern for Predicting Ultra Violet (UV) Effects in Environment Data Management System (EDMS)
Published 2013“…The result of the measurement exercises produced various patterns, each with unique identification for developing database pattern algorithm. …”
-
9
Predicting sales trends for school cooperative using Market Basket Analysis
Published 2025“…The FP-Growth algorithm was implemented to discover frequent item sets and purchasing patterns from transactional data. …”
Get full text
Get full text
Student Project -
10
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019“…However, there are some limitations in the performance of these tools, as the algorithms are dependent on the seismic survey parameters, quality of the data and its existing patterns, and geology of the study area. …”
Get full text
Get full text
Conference or Workshop Item -
11
Exploratory study of Kohonen network for human health state classification
Published 2018“…It gives good distribution for training and test patterns. Study to the variation of dataset’s size will be considered in the near future to evaluate the performance of the network.…”
Get full text
Get full text
Article -
12
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…This will allow the investigators to detect the data remnants and identify their patterns. The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
13
Optimized multi-level elongated quinary patterns for the assessment of thyroid nodules in ultrasound images
Published 2018“…The evaluation of this CAD system on both private and public datasets confirmed its effectiveness as a secondary tool in assisting radiological findings.…”
Get full text
Get full text
Article -
14
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…To mitigate the impact of these harmful actions, it is crucial to identify and address them promptly and effectively. This study evaluates specific patterns of detrimental behaviour using data from Kaggleto predict and analyzeprevalent negative behaviours. …”
Get full text
Get full text
Get full text
Article -
15
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
16
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
Get full text
Get full text
Final Year Project -
17
Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection
Published 2023“…Furthermore, it is hybridized with the Pattern Search algorithm to ensure the optimality of the solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
The effect of job satisfaction on the relationship between organizational culture and organizational performance
Published 2023“…Furthermore, it is hybridized with the Pattern Search algorithm to ensure the optimality of the solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article
