Search Results - (( using data (processing OR proceeding) algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
4
-
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Pattern Discovery Using K-Means Algorithm
Published 2024“…This paper will discuss the results of a pattern extraction process using a clustering algorithm that is k-means. …”
Proceedings Paper -
9
HYBRID: an efficient unifying process to mine frequent itemsets
Published 2018“…In this paper, an efficient hybrid algorithm was designed using a unifying process of the algorithms Improved Apriori and FP-Growth. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2014“…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…As the immense growth of data have affected many organizations, there have been a need to adopt the cloud resources for processing big data applications which could cost highly by using traditional storage. …”
Get full text
Get full text
Proceeding Paper -
13
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…The results showed that using canopy as a preprocessing step cut the time it proceeds to deal with the significant number of power load abnormalities found in parallel using a fast density peak dataset and the time it proceeds for the k-means algorithm to run. …”
Article -
14
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008“…Our algorithm is evaluated using two sets of DNA sequences with comparisons. …”
Get full text
Get full text
Get full text
Proceeding -
15
Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour
Published 2022“…Meanwhile, k-NN algorithm is used to classify the experimental data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…The performance metric used to measure the performance are time duration for a complete process and CPU utilization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Sizes of Superpixels and their Effect on Interactive Segmentation
Published 2021“…Pre-processing steps can be used to speed up the segmentation process while improving the end result. …”
Get full text
Get full text
Get full text
Proceeding -
18
Algorithmic approaches in model selection of the air passengers flows data
Published 2015“…Algorithm is an important element in any problem solving situation.In statistical modelling strategy, the algorithm provides a step by step process in model building, model testing, choosing the ‘best’ model and even forecasting using the chosen model.Tacit knowledge has contributed to the existence of a huge variability in manual modelling process especially between expert and non-expert modellers.Many algorithms (automated model selection) have been developed to bridge the gap either through single or multiple equation modelling.This study aims to evaluate the forecasting performances of several selected algorithms on air passengers flow data based on Root Mean Square Error (RMSE) and Geometric Root Mean Square Error (GRMSE).The findings show that multiple models selection performed well in one and two step-ahead forecast but was outperformed by single model in three step-ahead forecasts.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Sizes of Superpixels and their Effect on Interactive Segmentation
Published 2021“…Pre-processing steps can be used to speed up the segmentation process while improving the end result. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
