Search Results - (( topic classification clustering algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…Cluster and classification analysis are very interesting data mining topics that can be applied in many fields. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Social networks content analysis for peacebuilding application by Shaikh, Muniba, Salleh, Norsaremah, Abdullah, Lili Marziana

    Published 2015
    “…The proposed framework shows that twitter is most popular SN for Pb CA purpose and proposed framework presents the searching criteria and custom filters to extract the topic specific data. Moreover, the research proposes to use lexical analysis (LA) method to extract the SNs features, 1st order context representation (CR) technique to represent the context of the extracted features, DBSCAN clustering algorithm for data management by making different clusters, ranking algorithm, Log likelihood ratio and SVM techniques for content analysis and classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    Activity recognition using optimized reduced kernel extreme learning machine (OPT-RKELM) / Yang Dong Rui by Yang , Dong Rui

    Published 2019
    “…As a consequence, HAR has been identified as a potential topic for healthcare assessment systems. One of the major research problems is the computation resources required by machine learning algorithm used for classification for HAR. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election by Jufri, Aedah, Abd Rahman, Suarga, .

    Published 2024
    “…To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
    Get full text
    Get full text
    Get full text
    Journal
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10