Search Results - (( developing affecting training algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- developing affecting »
- java implementation »
- affecting training »
- training algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…One of the essential factors that affect the performance of Artificial Neural Networks is the learning algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
Get full text
Get full text
Thesis -
10
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…Railway system consists of complicated, most often than not, confusing routes. As train networks expand, routes complexity increases thus indirectly affecting accustomed user. …”
Get full text
Get full text
Thesis -
11
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
Published 2022“…Moreover, the task of removing noises without causing speech distortion is also challenging, in which the quality and intelligibility of speech are affected. In order to overcome these issues, a supervised Deep Neural Network (DNN) algorithm predicted constrained Wiener Filter (cWF) target mask algorithm based on extracted Gammatone filter bank power spectrum (GF-TF) features and trained model is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Development of heuristic task scheduling algorithm in cloud computing
Published 2016Get full text
Get full text
Proceeding Paper -
13
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…This project is developed to train the computer programs to recognize objects in the pictures. …”
Get full text
Get full text
Thesis -
14
Analyzing CT images for detecting lung cancer by applying the computational intelligence-based optimization techniques
Published 2022“…To attain the problem statement, an lung cancer identification system is developed with the help of a meta-heuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…An efficient iterative algorithm is developed to optimize the objective function of the proposed algorithm since it is non-smooth and difficult to solve. …”
Get full text
Get full text
Get full text
Thesis -
17
Physics-guided deep neural network to characterize non-Newtonian fluid flow for optimal use of energy resources
Published 2021“…In this research, a novel algorithm (Herschel Bulkley Network) is introduced to simulate the non-Newtonian fluid flow in a pipe using data redundant deep neural network (DNN) for fully developed, laminar, and incompressible flow conditions. …”
Get full text
Get full text
Article -
18
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
19
Prediction of UiTM student academic performance using Naive Bayes algorithm / Muhammad Irfan Zahin Jailani
Published 2024“…This paper proposes a predictive system using the Naive Bayes algorithm to solve the pressing issue of low academic performance among students at Universiti Teknologi MARA (UiTM).The study underlines a variety of factors affecting student outcomes while highlighting the significance of effective academic performance. …”
Get full text
Get full text
Thesis -
20
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article
