Search Results - (( topic classification clustering algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- classification clustering »
- topic classification »
- application modified »
- java application »
-
1
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Cluster and classification analysis are very interesting data mining topics that can be applied in many fields. …”
Get full text
Get full text
Thesis -
2
-
3
Social networks content analysis for peacebuilding application
Published 2015“…The proposed framework shows that twitter is most popular SN for Pb CA purpose and proposed framework presents the searching criteria and custom filters to extract the topic specific data. Moreover, the research proposes to use lexical analysis (LA) method to extract the SNs features, 1st order context representation (CR) technique to represent the context of the extracted features, DBSCAN clustering algorithm for data management by making different clusters, ranking algorithm, Log likelihood ratio and SVM techniques for content analysis and classification. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Activity recognition using optimized reduced kernel extreme learning machine (OPT-RKELM) / Yang Dong Rui
Published 2019“…As a consequence, HAR has been identified as a potential topic for healthcare assessment systems. One of the major research problems is the computation resources required by machine learning algorithm used for classification for HAR. …”
Get full text
Get full text
Get full text
Thesis -
6
Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election
Published 2024“…To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
Get full text
Get full text
Get full text
Journal -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
