Search Results - (( pattern operation mining algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- pattern operation »
- operation mining »
- mining algorithm »
- java application »
-
1
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
2
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…The proposed method is based on comparing two algorithms: Apriori and Frequent Pattern Growth (FP- Growth). …”
Get full text
Get full text
Article -
3
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
4
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
Get full text
Get full text
Get full text
Article -
5
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. …”
Get full text
Get full text
Get full text
Article -
6
Trajectory pattern mining via clustering based on similarity function for transportation surveillance
Published 2016“…A comprehensive traffic data, that is vehicle trajectory, is selected as reliable data for discovering the underlying pattern via trajectory mining. As the task of monitoring moving vehicles via vehicle trajectory dataset can be tedious, researchers are keen to provide solutions that reducing the tedious task performed by the traffic operators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The second component is the search process that is operated by a pattern matching. The third process is the parsing that is operated by a text mining algorithm. …”
Article -
8
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
Get full text
Get full text
Thesis -
9
Hybrid self organizing map for overlapping clusters
Published 2008“…The Kohonen self organizing map is an excellent tool in exploratory phase of data mining and pattern recognition. The SOM is a popular tool that maps high dimensional space into a small number of dimensions by placing similar elements close together, forming clusters. …”
Get full text
Get full text
Article -
10
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
Get full text
Get full text
Monograph -
11
A grid enabled E-theses and dissertations repository system
Published 2002“…For future direction, research will be focused on searching algorithm using data mining or pattern discovery to minimise the respond time.…”
Get full text
Get full text
Get full text
Article -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
13
An enhanced android botnet detection approach using feature refinement
Published 2019“…The botnets targeting the smartphones and mobile devices which are using Android operating system due to their highly personal and powerful attributes. …”
Get full text
Get full text
Thesis -
14
Evolving fuzzy grammar for crime texts categorization
Published 2015“…Text mining refers to the activity of identifying useful information from natural language text. …”
Get full text
Get full text
Get full text
Article -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia
Published 2019“…To simulate debris flow run-out pattern, a friction resistance model (Voellmy model) RAMMS-dbf was modified by fusing erosion model; this improve the model results in reality. …”
Get full text
Get full text
Thesis -
17
