Search Results - (( java implementation tree algorithm ) OR ( using visualisation mining algorithm ))
Search alternatives:
- visualisation mining »
- java implementation »
- implementation tree »
- mining algorithm »
- tree algorithm »
-
1
-
2
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…It can be applied in data mining exploration and statistical data analysis. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang
Published 2019“…In this thesis, I aimed to create, using computational and statistical approaches, an integrative digital resource that can be mined to identify drug candidates that could be repurposed for oral cancer treatment. …”
Get full text
Get full text
Thesis -
7
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
8
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…Cryptojacking is a subset of cybercrime in which hackers use unauthorised devices (computers, smartphones, tablets, and even servers) to mine cryptocurrencies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Forecasting utility management in UiTMCTKKT using predictive analytics / Nur Sufiah Muhammad Taufik
Published 2025“…Future iterations could also improve the system using real-time monitoring and machine-learning based predictive algorithms.…”
Get full text
Get full text
Thesis
