Search Results - (( process formation mining algorithm ) OR ( java application using algorithm ))
Search alternatives:
- formation mining »
- mining algorithm »
- java application »
- using algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
RELMARK: An innovative algorithm for preprocessing of transactional business data
Published 2015“…Association rule mining is a popular research topic due to many useful applications.The initial task in producing association rule is to ensure that only suitable data formats are fed into the mining process.Providing a correct data format for association rule mining is an essential and crucial task as wrong data will yield wrong results and interpretations.In this research work, an efficient algorithm for converting relational data format into transactional data format is presented.This transactional data format suited the SAS Enterprise Miner Software for association rule mining technique. …”
Get full text
Get full text
Article -
3
Framework for mining XML format business process log data
Published 2024“…This study introduces an alternative approach for mining XML format documents which can be modelled into tree-structured format. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…The mining process entails data cleaning, formatting, filtering, and identifying the candidate keywords. …”
Article -
5
The semantics of norms mining in multi-agent systems
Published 2023“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Conference paper -
6
The semantics of norms mining in multi-agent systems
“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Get full text
Conference or Workshop Item -
7
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A norms mining approach to norms detection in multi-agent systems
Published 2023“…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
Conference paper -
9
A norms mining approach to norms detection in multi-agent systems
Published 2012“…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
Get full text
Conference or Workshop Item -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm
Published 2012“…We use frequent pattern growth (FP-Growth) algorithm in the data processing step to build the FP-tree data structure and mine it for frequents itemsets. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
Automatic clustering of gene ontology by genetic algorithm
Published 2006“…Experimental results and an example of modularized Gene Ontology in RDF/XML format are given to illustrate the effectiveness of the algorithm…”
Get full text
Get full text
Article -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
