Search Results - (( java implementation mining algorithm ) OR ( user evaluation based algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- evaluation based »
- user evaluation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Thus, the study is to explore how the recommendation engines will work and use user-based collaborative filtering as an algorithm for the movie recommendation. …”
Get full text
Get full text
Thesis -
9
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
10
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
11
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
12
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010“…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
Get full text
Get full text
Conference or Workshop Item -
13
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
Get full text
Get full text
Thesis -
14
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
-
17
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
18
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
19
Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms
Published 2000“…For experienced users, Csound is preferred over Cool Edit Pro. Conclusions drawn from this research finding is that different software approaches fulfill different kinds of user expectations depending on user experience.…”
Get full text
Get full text
Thesis -
20
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis
