Search Results - (( knowledge segmentation mining algorithm ) OR ( java applications usage algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach by Munnian, Ruthrakumar

    Published 2019
    “…The data was pre-processed to remove the outliers prior to classification analysis with the aid of the Waikato Environment for Knowledge Analysis (WEKA) tool. Classification analysis was initially performed on all seven classifier’s algorithms at 10-fold dross validation mode. …”
    Get full text
    Get full text
    Monograph
  2. 2

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item