Search Results - (( programming problem detection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- problem detection »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
An optimal mesh algorithm for remote protein homology detection
Published 2011“…Remote protein homology detection is a problem of detecting evolutionary relationship between proteins at low sequence similarity level. …”
Get full text
Get full text
Article -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
-
10
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
11
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
12
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
13
The application of Hough Transform for corner detection
Published 2006“…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. To illustrate the problem, the interface program is developed by using Microsoft Visual C++ 6.0.…”
Get full text
Get full text
Thesis -
14
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
15
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…The algorithm is developed so that it is capable to detect various objects by applying a bounding box on the frame image. …”
Get full text
Get full text
Monograph -
16
-
17
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
Get full text
Get full text
Article -
18
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
Get full text
Get full text
Conference or Workshop Item -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis
