Search Results - (( structures perception modelling algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- structures perception »
- perception modelling »
- modelling algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
9
The Development of Color Based Visual Search Utility
Published 2001“…The database-indexing algorithm designed to be independent to the database. …”
Get full text
Get full text
Thesis -
10
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The application of proposed approach is the modelling the branching structures by deriving a rule from best solution of VIGA-20. …”
Get full text
Get full text
Thesis -
11
A technique for checking the adequacy of formal model
Published 2021“…Named technique is based on differentiation between the concepts of analytical plane of model perception and the concepts of corresponding implementation plane. …”
Get full text
Get full text
Get full text
Article -
12
Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors
Published 2017“…The statistical analysis tools employed are the Statistical Package for Social Science (IBM SPSS version 22.0 for Windows) and Partial Least Square-Structural Equation Modeling! (PLS-SEM)version 3.2.3). …”
Get full text
Get full text
Get full text
Thesis -
13
Permutation entropy based full-reference image quality qssessment
Published 2019“…Motivated by the need of appropriate objective models, we propose a novel objective IQA algorithm, namely, Permutation Entropy Deviation Index (PEDI), based on the working principle of permutation entropy (PE). …”
Get full text
Get full text
Conference or Workshop Item -
14
Artificial intelligence in the construction industry / Nurul Najihah Mad Rosni
Published 2023“…There are numerous applications of AI in analysis, loading capacity prediction, and damage level prediction of existing structures for retrofitting. AI algorithms and models could function to enhance the analysis of buckling and fatigue of structural components. …”
Get full text
Get full text
Article -
15
Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli
Published 2018“…Based on the prosody analysis, a grammar-based prosody modification rules are proposed by integrating grammatical structure. Consequently, new rules and algorithm that is MustFront rule, limitation rule, and two-steps pitch contour algorithm are introduced to increase the synthesized speech quality. …”
Get full text
Get full text
Thesis -
16
Overview of Evolutionary Algorithms and Neural Networks for Modern Mobile Communication
Published 2024journal::journal article -
17
Environmental sustainability and its antecedents among millennial and gen-z students in a public higher learning institution
Published 2024“…We designed a questionnaire and gathered information through an online survey. We used the Structural Equation Modelling Partial Least Square (SEM-PLS) algorithm, specifically SMART PLS 3.2.7, to analyze the data for hypothesis testing. …”
Get full text
Get full text
Get full text
Article -
18
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…By presenting a brief overview of previous 3D digital documentation efforts undertaken in the field of cultural heritage (CH) in Malaysia, the final aim of this study is to compare the visual accuracy of 3D models generated by CV system, and 3D models produced by terrestrial long-range scanner and structured white light systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Audience Responses to Newspaper Coverage of Floods in China: Victims Versus Onlookers
Published 2026“…The study involved semi-structured interviews with 20 participants living in China (13 flood victims and 7 onlookers who did not experience flood). …”
Get full text
Get full text
Get full text
Get full text
Article
