Search Results - (( developing consumer usage algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- developing consumer »
- java implementation »
- mining algorithm »
- usage algorithm »
- consumer usage »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
-
9
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Overall, an algorithm showing the combination method of both GA and DCT was successfully developed. …”
Get full text
Get full text
Final Year Project -
10
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
11
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
12
Data mining and analysis for predicting electrical energy consumption
Published 2024“…The project's electricity consumers are categorized by their hourly power usage percentage. …”
Article -
13
Modelling of assembly line balancing with energy consumption
Published 2023“…One of the most gravitate issues in the world is energy usage. As the largest consumer in terms of energy usage, the manufacturing sector had introduced a lot of approaches to decrease their energy utilization. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Brain tumor image segmentation using deep learning approach
Published 2022“…Deep learning algorithm is able to provide good tumor segmentation results compared to other conventional segmentation algorithms as it learns from the labeled brain MRIs to predict the location of tumor region and consequently segment the tumor. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Feature selection in intrusion detection, state of the art: A review
Published 2016“…Also, ambiguous features increase the time complexity and consume other computational resources as well. By removing these irrelevant and redundant features accuracy of the learning algorithms can be increased. …”
Get full text
Get full text
Article -
17
Energy-saving framework for data center from reduce, reuse and recycle perspectives
Published 2019“…We recategorized energy attributes of the existing Energy Efficient Data Center Frameworks (EEDCFs) to be aligned with 3R. Then, we developed energy-saving algorithms in response to the concept. …”
Get full text
Get full text
Get full text
Article -
18
A study of customer retention and churn rate management through data mining and customer profiling of Malaysian mobile user
Published 2012Get full text
Get full text
Conference or Workshop Item -
19
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…In addition, the mechanism improves the data gathering ratio by up to 70% and 68%, respectively. This is due to the developed technique helps to reduce the high consumed energy in the sensor network and increases the data collection throughout the transmission states in wireless sensor networks.…”
Get full text
Get full text
Article -
20
Predicting motorcycle customization preferences using machine learning
Published 2025“…The classification model was developed using the Random Forest algorithm, Support Vector Machine and Logistic Regression with 5-fold Cross validation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
