Search Results - (( java implementation mining algorithm ) OR ( using internet patterns algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- internet patterns »
- mining algorithm »
- using internet »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021“…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…The performance tests are also conducted to assess whether each algorithm can detect most of the true anomalies. The data is supplied using IoT devices, and benchmark datasets are also presented to test the algorithm's performance.…”
Get full text
Get full text
Thesis -
10
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…Businesses have adopted certain algorithms that can help them to extract information from the Internet to discover potentially significant patterns inherent in the database, which can help the online marketing strategy. …”
Get full text
Get full text
Conference or Workshop Item -
11
Logo recognition using Artificial Neural Network (ANN) / Nor Hamidah Abdul Ghafar
Published 2005“…The binary representation was used for the input node of neural network for back propagation training algorithm. …”
Get full text
Get full text
Student Project -
12
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
13
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud.…”
Get full text
Get full text
Article -
14
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The results for the selection were evaluated respectively to see the variation in selection pattern when compared to the default selection algorithm. …”
Get full text
Get full text
Get full text
Article -
15
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
16
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…This report discusses the design of monitoring and control system using Internet of Things (IoT) based power limiter, which is designed to monitor and manage electricity consumption in real-time. …”
Get full text
Get full text
Book Section -
17
Analysis of Chinese patents associated with incremental clustering algorithms: A review / Archana Chaudhari
Published 2022“…To achieve learning from such dynamic data sources, incremental clustering algorithms are used mandatorily. This mandate has given rise to increased patents related to incremental clustering concept, which is primarily a significant part of Machine Learning field. …”
Get full text
Get full text
Get full text
Article -
18
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…This huge amount of data can be a useful source of knowledge. Advanced mining processes are needed for this knowledge to be extracted, understood and used. …”
Get full text
Get full text
Article -
19
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…As a result, to deliver acceptable services, a new solution is necessary to secure data accountability, increase data privacy and accessibility, and extract hidden patterns and usable knowledge. Moving the Internet of Things to a distributed ledger system might be the most effective way to solve these issues. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
