Search Results - (( java implementation some algorithm ) OR ( system implementation mining algorithm ))
Search alternatives:
- system implementation »
- implementation mining »
- java implementation »
- implementation some »
- mining algorithm »
- some algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
A collaborative filtering recommender system for infrequently purchased product using slope-one algorithm and association rule mining
Published 2015“…This is due to the fact that travelling are expensive and time consuming. This project implement the collaborative filtering using slope-one algorithm and also implement association rule mining in recommending hotels for tourist. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Then, the system implementation part explains the selected tools chosen for implementing the system which using the Clementine Data Mining Solution. …”
Get full text
Get full text
Thesis -
6
-
7
Discovering association rules for mining images datasets: a proposal
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems
Published 2023“…In this paper, we present our proposed algorithm to detect the obligation and prohibition norms which we called the Obligation and Prohibition Norms Mining algorithm (OPNM). …”
Conference paper -
9
The semantics of norms mining in multi-agent systems
“…We then present an algorithm of the norms mining operation and demonstrate the success of the technique in detecting the potential norms. …”
Get full text
Conference or Workshop Item -
10
-
11
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
12
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
13
The semantics of norms mining in multi-agent systems
Published 2023“…We then present an algorithm of the norms mining operation and demonstrate the success of the technique in detecting the potential norms. � 2012 Springer-Verlag.…”
Conference paper -
14
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
15
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
16
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
18
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
19
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…By implementing soft computing techniques in data mining especially in HR field can enhance the knowledge discovery process for intelligent decision system. …”
Get full text
Get full text
Research Reports -
20
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…Machine learning is an implementation of artificial intelligence (Al) that allows systems to learn and build on knowledge without being directly programmed automatically. …”
Get full text
Get full text
Thesis
