Search Results - (( java application based algorithm ) OR ( pre generation mining algorithm ))
Search alternatives:
- application based »
- generation mining »
- java application »
- mining algorithm »
- pre generation »
-
1
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
2
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…To address this, missing customer IDs are filled with the last valid ID, assuming repeated purchases. The FP-Growth algorithm was found to be faster and more effective than the Apriori algorithm in extracting frequent item sets and generating association rules. …”
Get full text
Get full text
Article -
3
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Assessing the relationship between pollution sources and water quality parameters of Sungai Langat Basin using association rule mining
Published 2020“…Both data are combined and pre-processed through association rule mining for further modelling processes. …”
Get full text
Get full text
Get full text
Article -
6
Discovering optimal clusters using firefly algorithm
Published 2016Get full text
Get full text
Article -
7
-
8
Predicting game-induced emotions using EEG, data mining and machine learning
Published 2024“…Conclusion The fndings in this study fll the existing gap of game-induced emotion recognition feld by providing an in-depth evaluation on the ruleset algorithm’s performance and feasibility of applying the generated rules on the game-induced EEG data for justifying the emotional state prediction result.…”
Get full text
Get full text
Get full text
Article -
9
Sequential pattern mining using personalized minimum support threshold with minimum items
Published 2011“…This approach is then applied in the SPADE Algorithm using vector array as an extension from the previous method of using relational database and pre-defined threshold.The result from this experiment demonstrates that P_minsup with the complement of min_i value approach is applicable in assisting the process of determining the suitable threshold value to be used in detecting users' frequent k-sequential topics in navigating the World Wide Web (WWW).…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Among all these techniques, classification is one of the most commonly used tasks in data mining, which is used by many researchers to classify instances into two or more pre-determined classes. …”
Get full text
Get full text
Thesis -
11
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…A total of 31 criteria were pre-processed to establish the input dataset for NN modeling. …”
Get full text
Get full text
Thesis -
12
Modeling Teacher's Integrity Using Data Mining
Published 2010“…The dataset called teachers's integrity dataset contain 1500 records elaborates with 25 attributes including a target class were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
Get full text
Get full text
Monograph -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Improving sentiment reviews classification performance using support vector machine-fuzzy matching algorithm
Published 2023“…Many of these dimensionalities have a major impact on the complexity and performance of the algorithms used for classification. Various challenges were encountered, including how to determine the optimal combination of pre-processing techniques, how to clean the dataset, and determine the best classification algorithm. …”
Get full text
Get full text
Get full text
Article -
18
An adaptive anomaly threshold in artificial dendrite cell algorithm
Published 2017“…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
