Search Results - (( developing alternative based algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- developing alternative »
- implementation mining »
- java implementation »
- alternative based »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
TOPSIS-based Regression Algorithms Evaluation
Published 2022“…The compared regression alternatives were scored and ranked based on their distance from these alternatives. …”
Get full text
Get full text
Article -
9
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…These proposed methods are able to evaluate the alternatives or criteria based on the different opinion with different assessment measurement and also able to minimize the number of pair-wise comparisons when the number of criteria increase. …”
Get full text
Get full text
Thesis -
10
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…This paper is based on a study that attempts to provide an alternative to ontology lookup for Semantic information retrieval. …”
Get full text
Get full text
Conference or Workshop Item -
11
Lattice-based cryptography: the dots that provide information security
Published 2023“…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
12
-
13
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019“…Therefore, this research proposed an implementation of genetic algorithm (GA) with knowledge based operators as an alternative to approximate the solution.…”
Get full text
Get full text
Thesis -
14
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…The most critical task for developing this project is how to encode the algorithm based on the domain, Transcendental Equation. …”
Get full text
Get full text
Thesis -
15
Path planning for constant speed robot
Published 2006“…The simulation analysis is performed to prove the effectiveness and robustness of the guidance algorithm for the mobile robot. The performance of the guidance algorithm will be compared with an existing guidance algorithm based on kinematics geometry introduced by Lin [5] and with an alternative guidance strategy employing geometrical analysis and Matlab’s simulation…”
Get full text
Get full text
Thesis -
16
Agreement options for negotiation on material location decision of housing development
Published 2020“…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
17
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…The algorithm is based on erosion followed by dilation segmentation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Random forest algorithm for co2 water alternating gas incremental recovery factor prediction
Published 2020“…RF develops multiple decision trees based on the random selection of the input data and random selection of the variables. …”
Get full text
Get full text
Article -
19
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016“…In future work, the accuracy of proposed model can be strengthened by comparative study with other heuristic based searching algorithms such as genetic algorithm, ant colony optimization, swam algorithms and etc.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article
