Search Results - (( java application mining algorithm ) OR ( changes detection mining algorithm ))
Search alternatives:
- application mining »
- changes detection »
- java application »
- mining algorithm »
- detection mining »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
3
-
4
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
11
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
12
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
15
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…The experimental result shows BOCEDS is able to generate new clusters and remove outdated clusters with time as data stream contents change. The experiment on noisy data stream shows that BOCEDS algorithm can detect noise with an accuracy of approximately 100%. …”
Get full text
Get full text
Thesis -
16
Predicting heart disease using ant colony optimization / Siti Aisyah Ismail
Published 2021“…Thus, this study used the Ant Colony Optimization algorithm with data mining called Ant-Miner to predict heart disease because it is said that Ant-Miner’s rule list is simpler than other rule induction algorithms. …”
Get full text
Get full text
Student Project -
17
Classification of metamorphic virus using n-grams signatures
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A buffer-based online clustering for evolving data stream
Published 2019“…The sensitivity of clustering parameters is also measured. The proposed algorithm is then applied to real-world weather data streams to demonstrate its capability to detect changes in data stream and discover arbitrarily shaped clusters. …”
Get full text
Get full text
Get full text
Article -
19
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The computational complexity and mathematical formulation solutions are some limitations in optimizing the relay characteristic changes with changes in the system reactive power penetration for effective fault detection and isolations. …”
Get full text
Get full text
Thesis -
20
Rotation Forest Ensemble Classifier to Improve the Cardiovascular Disease Risk Prediction Accuracy
Published 2021“…Early-stage prediction can save the lives by undergoing appropriate diagnosis steps or making necessary changes in their lifestyles. Recent studies have focused on the use of data mining and machine learning in the detection of diseases based on specific features of a person. …”
Get full text
Get full text
Conference or Workshop Item
