Search Results - (( _ constructing stem algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- constructing stem »
- java application »
- mining algorithm »
- stem algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Building a French Stemmer Using a Dictionary of French Root Words
Published 1999“…Then, the actual stemming process is performed. The stemming algorithm constructed is tested using selected criteria, among which are inflection removal, prefix stripping and suffix stripping. …”
Get full text
Get full text
Thesis -
8
Incorporation of interference fit and cyclic loading in simulation algorithm for better prediction of micromotion of femoral stems
Published 2007“…Interface micromotion beyond a certain threshold limit inhibits bone ingrowth and favours the formation of fibrous tissue. In this study, an algorithm was constructed to predict micromotion and therefore instability of femoral stems. …”
Get full text
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Development of an open-source and low-cost robotic arm based on STM32 microcontroller for promoting STEM education
Published 2023“…The control algorithm for a 3D-printed MK2 robot arm was programmed with an STM32 microcontroller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An Arabic hadith text classification model using convolutional neural network and support vector machine / Mohd Irwan Mazlin
Published 2022“…Fourth, the model is being tested using different stemming techniques, and it found that the model using non-stemming techniques gives higher accuracy with 92%. …”
Get full text
Get full text
Thesis -
12
Finite element study on the micromotion of cementless total hip arthroplasty
Published 2011Get full text
Working Paper -
13
Biomechanics analysis of cementless total hip arthroplasty
Published 2009Get full text
Working Paper -
14
Finite element study of metacarpophalangeal joint silicone implants
Published 2008“…An inhouse experimentally validated algorithm was used to calculate and display interface micromotion between the implant and the bone. …”
Get full text
Get full text
Book Section -
15
Enhancement of compound word extraction in Malay sentences using modified linguistics approaches / Zamri Abu Bakar
Published 2023“…Overall, this study has three objectives; to identify new rules in detecting the Malay compound word, to construct an improved compound word extraction technique (algorithm) that combines many rules for Malay sentences using linguistic approaches, and lastly to evaluate the accuracy of proposed technique from using the standard evaluation of Recall, Precious and F-Measure. …”
Get full text
Get full text
Thesis -
16
Predicting the popularity of tweets using the theory of point processes.
Published 2019“…The knowledge is combined using a novel empirical Bayes type approach, where the prior distribution for the model parameter is constructed based on the external knowledge, and the likelihood is calculated based on the internal knowledge. …”
Get full text
Get full text
UMK Etheses -
17
Multi depot dynamic vehicle routing problem with stochastic road capacity for emergency medical supply delivery in humanitarian logistics
Published 2022“…Specifically a PDS - Rollout Algorithm (PDS-RA) is adopted. Five variants of constructive base heuristics, Teach Based Insertion Heuristic (TBIH-1 - TBIH-5) are proposed complementing the PDSRA when dealing with the lookahead rollout involving stochastic road capacity. …”
Get full text
Get full text
Thesis -
18
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
Get full text
Get full text
Thesis
