Search Results - (( write classification technique algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- classification technique »
- write classification »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…After ensuring that the classification technique was able to accomplish this work, Hybrid Genetic Random Forests (HGRF) was introduced as a new ensemble classifier based on a Random Forest algorithm, but altered slightly with some innovations. …”
Get full text
Get full text
Get full text
Thesis -
4
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…It considers both presence and absence features thus it measured the form of linguistic features that reflected essay quality. MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
Get full text
Get full text
Thesis -
7
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…The purpose of this writing is to study and understand the existing crack detection techniques using image processing. …”
Get full text
Get full text
Article -
13
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
14
Segmentation techniques for Arabic handwritten: a review
Published 2024“…The paper will also touch on the classification of segmentation algorithms originally designed for modern documents, illustrating their adaptation in document processing. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…Jawi is the original Malay writing based on Arabic characters. The technique proposed models triangles on images and extracts features from them. …”
Get full text
Get full text
Article -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
17
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
18
Cluster validity of Xie and Beni and the partition coefficient indexes for fuzzy c-means clustering / Nor Azrin Ahmad Mustaffa
Published 2010“…Therefore, segmentation of mammographic images is an important phase in image analysis that can be further applied to other algorithms for specific tasks such as the detection and classification of breast anomalies. …”
Get full text
Get full text
Thesis -
19
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…In this chapter, feature selection is explored in order to find the most unique individual significant features which are the unique features of individual’s writing. This chapter focuses on the integration of Swarm Optimized and Computationally Inexpensive Floating Selection (SOCIFS) feature selection technique into the proposed hybrid of Writer Identification framework 386 S.F. …”
Get full text
Get full text
Book Chapter -
20
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
Get full text
Get full text
Book Chapter
