Search Results - (( processes interactions mining algorithm ) OR ( java application system algorithm ))
Search alternatives:
- processes interactions »
- interactions mining »
- mining algorithm »
- java application »
- system algorithm »
-
1
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
2
Prime-based method for interactive mining of frequent patterns
Published 2010“…At first, a general architecture for interactive mining is proposed consisting of two isolated components: mining model and mining process. …”
Get full text
Get full text
Thesis -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
-
6
Analysis using data mining techniques: the exploration and review data of diabetes patients / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2025“…In this statistical summary procedure, the distribution of attributes and their interactions are crucial for accurately processing the data in accordance with the selected classification or data mining techniques to be performed. …”
Get full text
Get full text
Get full text
Article -
7
Comparative study of machine learning algorithms in data classification
Published 2025“…In many different fields, data mining, the process of identifying significant patterns in historical data, is essential to decision-making. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this technique, the visitor agent is equipped with an algorithm, which detects the potential norms through the system's log file, interactions with the local agents, and observing the local agents in action. …”
Get full text
Conference or Workshop Item -
9
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
11
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
Get full text
Get full text
Article -
12
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
-
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
-
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
A norms mining approach to norms detection in multi-agent systems
Published 2023“…In this technique, the visitor agent is equipped with an algorithm, which detects the potential norms through the system's log file, interactions with the local agents, and observing the local agents in action. …”
Conference paper -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis
