Search Results - (( java implementation tree algorithm ) OR ( pattern detection graph algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- pattern detection »
- graph algorithm »
- tree algorithm »
-
1
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
2
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
Get full text
Get full text
Monograph -
3
Scalability and performance in duplicate detection : relational vs. graph database
Published 2023“…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…This paper focuses on a graph-based approach for text representation and presents a novel error tolerance dissimilarity algorithm for deviation detection. …”
Get full text
Get full text
Get full text
Article -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
6
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A framework for multiple moving objects detection in aerial videos
Published 2019“…Comparison is also done with three existing detection algorithms where experiments show promising results with precision at 94%, and recall at 89%.…”
Get full text
Get full text
Get full text
Book Section -
8
A Distributed Event Detection Scheme for Wireless Sensor Networks
Published 2009“…We propose a low-computation, distributed, and lightweight event detection scheme in wireless sensor networks, which is adopted from the pattern recognition scheme known as Distributed Hierarchical Graph Neuron. …”
Get full text
Get full text
Conference or Workshop Item -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
10
Collective interaction filtering with graph-based descriptors for crowd behaviour analysis
Published 2018“…The group detection experiment is implemented using the clustering algorithm. …”
Get full text
Get full text
Thesis -
11
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
12
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Development of IoT-based heatstroke early symptoms monitoring system for students in Malaysia
Published 2024“…The collected data is processed through a sophisticated algorithm that analyzes patterns indicative of heatstroke risk. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…The estimation of Stereo Matching Algorithm (SMA) is one of the extensive research topics for obtaining the disparity map from two images. …”
Get full text
Get full text
Get full text
Thesis
