Search Results - (( java implementation mining algorithm ) OR ( point coding learning algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- learning algorithm »
- mining algorithm »
- coding learning »
- point coding »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
Get full text
Get full text
Get full text
Article -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Recognition of the cursive handwritten courtesy amounts of Malaysian bank cheques.
Published 2001“…In this paper, we present techniques to recognise the cursive handwritten courtesy amount from Malaysian bank cheques and convert it into its corresponding ASCII codes. The image is pre- processed and segmented using the combination of crossed-point, curved-point and histogram techniques. …”
Get full text
Get full text
Conference or Workshop Item -
12
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
Get full text
Get full text
Get full text
Thesis -
13
Phishing image spam classification research trends: Survey and open issues
Published 2020Get full text
Get full text
Article -
14
-
15
