Search Results - (( java application mining algorithm ) OR ( model validating site algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- model validating »
- site algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Performance evaluation of hospital site suitability using multilayer perceptron MLP and analytical hierarchy process AHP models in Malacca, Malaysia
Published 2022“…The outcome of the predicted site models was validated utilizing CFS 10-fold cross-validation, as well as ROC curve (receiver operating characteristic curve). …”
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Hospital site suitability assessment using three machine learning approaches: evidence from the Gaza strip in Palestine
Published 2021“…The results of the predicted sites were validated using CFS cross-validation and the receiver operating characteristic (ROC) curve metrics. …”
Get full text
Get full text
Get full text
Article -
10
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…The programming algorithm of stochastic modelling was executed in MATLAB, whereas the deep learning model was established by using Python 3.6 programming language in Spyder. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…The indices indicated that the SVM model performed better than the other two algorithms in both training and validation datasets. …”
Get full text
Get full text
Article -
12
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
13
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
14
Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement
Published 2025“…Future work will emphasise empirical validation and the deployment of the YOLOv7 model for real-time, on-site assessment of fruit maturity in field conditions. …”
Get full text
Get full text
Get full text
Article -
15
Early tube leak detection system for steam boiler at KEV power plant
Published 2023Conference Paper -
16
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
17
Modelling the yield loss of oil palm due to Ganoderma Basal Stem Rot disease
Published 2016“…The predictive performance of the three best models which represent three different model building algorithms were assessed and compared. …”
Get full text
Get full text
Thesis -
18
Assessment of suitable hospital location using GIS and machine learning
Published 2022“…This research provided a comprehensive study for hospital site suitability and introduced machine learning models. …”
Get full text
Get full text
Thesis -
19
Modelling the yield loss of oil palm due to ganoderma basal stem rot disease
Published 2016“…The predictive performance of the three best models which represent three different model building algorithms were assessed and compared. …”
Get full text
Get full text
Get full text
Thesis -
20
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…Transferability of each of the models was verified by testing in another site for consistency. …”
Get full text
Get full text
Get full text
Thesis
