Search Results - (( java implementation mining algorithm ) OR ( using self data algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- data algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…The numbers of data will be analyzed using the R/S Statistic program and Variance Time Plot program. …”
Get full text
Get full text
Student Project -
9
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, SelfOrganizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…To address the noise problem in multi-view data, this study enhances the gbs method and develops a new self-weighted graph multi-view clustering algorithm (swmcan). …”
Get full text
Get full text
Thesis -
12
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The selfscalable selection algorithm uses dynamic range where the filter range is not preset and is determined by the algorithm itself based on the distribution and the values of the data in the global and local file. …”
Get full text
Get full text
Thesis -
13
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…For this project, Favoriot platform is used for real time data. The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
Get full text
Get full text
Conference or Workshop Item -
14
Academic leadership bio-inspired classification model using negative selection algorithm
Published 2015“…Negative selection algorithm has been successfully used in several purposes such as in fault detection, data integrity protection, virus detection and etc.due to the unique ability in self-recognition by classifying self or non-self’s detectors. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
Published 2006“…In this project, we have used the Successive random algorithm (SRA). Then, we have decided to use Variance time plot and R/S statistics as our statistical analysis tools. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Behavioural influence of TikTok’s algorithm recommendations on users’ engagement and users’ self-persuasion / Siti Khadijah Amir Hamzah, Ahlam Abdul Aziz and Shazleen Mohamed
Published 2025“…This study examines how TikTok's algorithm influences user behaviour, particularly in user engagement and self-persuasion. …”
Get full text
Get full text
Get full text
Article -
19
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
Get full text
Get full text
Article -
20
Generation of self similar network traffic using DFGN algorithm / Che Ku Noreymie Che Ku Jusoh
Published 2006“…This thesis discusses the generation of network traffic using discrete Fractional Gaussian Noise (dFGN) algorithm. …”
Get full text
Get full text
Thesis
