Search Results - (( java implementation mining algorithm ) OR ( using authentic learning algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- authentic learning »
- learning algorithm »
- mining algorithm »
- using authentic »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Bot detection using machine learning algorithms on social media platforms
Published 2021“…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Integration of spectroscopy and chemometric analysis for food authentication: a review
Published 2025“…This paper reviews various types of classification and regression algorithms in chemometric analysis to demonstrate the capabilities of these algorithms for use in food authentication processes. …”
Get full text
Get full text
Get full text
Article -
9
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis -
10
Prediction of Pakistani Honey Authenticity through Machine Learning
Published 2022“…Finally, the dataset for predicting the authenticity of Pakistani honey is lacking. Therefore, this study proposes a novel classification model to address the aforementioned weaknesses by classifying the authenticity of Pakistani honey using machine learning algorithms and several physicochemical features. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
-
13
Application of machine learning approach on halal meat authentication principle, challenges, and prospects: a review
Published 2024“…Some of the ML approaches used in Halal meat authentication have proven a high percentage of accuracy in meat authenticity while other approaches show no evidence of Halal meat authentication for now. …”
Get full text
Get full text
Get full text
Article -
14
BRAINPRINT AUTHENTICATION UNDER VARYING ENVIRONMENTAL CONDITIONS: MACHINE LEARNING VERSUS DEEP LEARNING
Published 2026“…Traditionally, EEG-based authentication requires a separate feature extraction step prior to the use of machine learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…Secondly, this work designs optimization measures from inertia weight and learning factor to build an improved particle swarm optimization algorithm (IPSO). …”
Get full text
Get full text
Article -
17
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
Get full text
Get full text
Thesis -
19
FACIAL RECOGNITION AT GATED COMMUNITY
Published 2021“…Facial recognition nowadays has been a popular choice in biometric authentication where it makes use of machine learning to perform its task of recognizing faces whether it be in a public or private property. …”
Get full text
Get full text
Final Year Project -
20
