Search Results - (( software identification tree algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- software identification »
- identification tree »
- application mining »
- java application »
- mining algorithm »
- tree algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
5
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Moreover, applying machine learning algorithms in the identification and classification of conflicting flows has limitations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…The oil palm tree counting from eCognition software provides the average counting accuracy of 90.3%. …”
Get full text
Get full text
Thesis -
13
Data mining approach to herbs classification
Published 2018Get full text
Get full text
Get full text
Article -
14
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
Get full text
Get full text
Student Project -
15
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Modelling of trees has attracted scientific research in various fields and disciplines since trees and forests play very important roles in the global system. …”
Get full text
Get full text
Get full text
Thesis -
16
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…—In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
Get full text
Get full text
Get full text
Article -
17
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
Get full text
Get full text
Article -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
19
Dataset of 16S ribosomal DNA sequences of bacteria isolated from marine red algae Kappapycus alvarezii
Published 2022“…The 16S rDNA gene sequences were analyzed, trimmed, and assembled into contigs using DNA Baser Sequence Assembler (V5) software. Taxonomic identification for the assembled sequences was achieved us- ing the online BLAST (blastn) algorithm, and the construction of a phylogenetic tree was performed using the MEGA7 soft- ware. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…The sample size was comprised of 55 non-infected trees and 37 infected trees. During the field experiments, oil palm tree samples of non-infected (T0), mild infected (T1), moderate infected (T2), and severe infected (T3) were measured using the FLIR T620 IR infrared thermal imaging camera to obtain the temperature of the oil palm trees. …”
Get full text
Get full text
Thesis
