Search Results - (( process detection modified algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- detection modified »
- application mining »
- process detection »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Evaluation of feature selection algorithm for android malware detection
Published 2018“…Therefore, the proposed approach modified the TF-IDF algorithm, where the algorithm focused on both sample and feature. …”
Get full text
Article -
5
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
Get full text
Get full text
Monograph -
7
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…The experimental result have proved that ACO-PFMDM have improved the overall performance of protein functional module detection. The search process of ACO-PFMDM has converged effectively compared to some state-of-art algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
Get full text
Get full text
Get full text
Thesis -
9
Improving test efficiency through multiple criteria coverage based test case prioritization using modified heuristic algorithm
Published 2016“…The fault detection capability of a prioritized test suite is improved up to 15 using Modified PSO which forms the base algorithms for prioritization. …”
Get full text
Get full text
Conference or Workshop Item -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A modified watershed segmentation algorithm for automated lung cancer lesion detection in CT scan images / Nur Najihah Sofia Mohd Marzuki
Published 2024“…The performance of the segmentation process in conventional and modified watershed segmentation technique for detecting lung lesion, which produce average F-Score is 97.80% and 99.09%, respectively. …”
Get full text
Get full text
Thesis -
13
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…Temporal Video Segmentation (TVS) process is the essential stage in CBVIR which aims to detect transitions between consecutive shots of videos. …”
Get full text
Get full text
Get full text
Thesis -
14
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article -
15
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. …”
Get full text
Get full text
Article -
16
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Multivariate Statistical Process Control (MSPC) uses historical data of processes to develop useful process fault detection, diagnosis and control tools. …”
Get full text
Get full text
Monograph -
17
Modified canny edge detection technique for joining discontinued edges
Published 2021Get full text
Get full text
Get full text
Get full text
Proceedings -
18
Investigation Of Edge Detection Techniques Based On Brain Tumor Images
Published 2018“…The images undergo three fundamental steps of edge detection techniques. The edge detection operators used to detect the brain tumor are Robert zero-crossing, Sobel operator, Prewitt operator, Canny operator and modified Canny algorithm. …”
Get full text
Get full text
Monograph -
19
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
20
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal
