Search Results - (( java implementation mining algorithm ) OR ( using quality trust algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- trust algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Statistically enhanced multi-dimensional trust computing mechanism for cloud computing
Published 2013“…Users can access cloud services and pay only for the usage similar to utilities.Trust computing systems can be employed for identifying the service providers quality in terms of their adherence to the committed in SLAs.Several trust computing mechanisms have been proposed in literature based on various algorithms and functions.Almost all of them are based on a single performance parameter and modify the trust scores monotonously when performance deviations are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores.Hence the proposed mechanism is protected from momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Article -
9
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Get full text
Article -
10
-
11
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In this research, three models have been proposed namely Trust and Reputation Model for Wireless Sensor Networks (TReM-WSN), Recommendation-based Trust Model (RecommTM) and a multidimensional Trust and Reputation Model using Social, Quality of service and Ant colony system (TRM-SQA). …”
Get full text
Get full text
Get full text
Thesis -
12
Trust-aware authentication and authorization for IoT: a federated machine learning approach
Published 2024“…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Cryptographic systems may be used to achieve VoIP security, but their impact on the Quality of Services (QoS) should be minimized. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Selection of prospective workers using profile matching algorithm on crowdsourcing platform
Published 2022“…These criteria become variables that are used in the profile matching algorithm to find workers who best match the profiles offered. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…Reviewing scientific articles for high-quality journals is time-consuming (some cases take up to a year). …”
Get full text
Get full text
Get full text
Thesis -
17
Application of artificial neural network in discriminating the agarwood oil quality using significant chemical compounds / Mohd Hezri Fazalul Rahiman … [et al.]
Published 2014“…A standard is needed to ensure that the agarwood oil can be qualified according to its chemical properties so that accuracy can be trusted. Therefore, as part of an on-going research in grading the agarwood oil quality, the application of ANN is proposed to analyse agarwood oil quality using its chemical profiles. …”
Get full text
Get full text
Get full text
Book Section -
18
-
19
Data Science for AI Chatbot Bias Detection and Mitigation in Healthcare
Published 2025“…To confront these challenges, the paper outlines methodologies for bias detection, including the use of fairness metrics and testing across diverse demographic cohorts. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Identification of critical factors underpinning banks’ lending relationship quality of SMEs: SMEs perspectives / Tury Retap
Published 2019“…The data were captured into SPSS 22 and evaluated by using SMARTPLS 3.2.7 iterative algorithm, bootstrapping and blindfolding procedures to obtain the results. …”
Get full text
Get full text
Thesis
