Search Results - (( developing face evolutionary algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- face evolutionary »
- mining algorithm »
- developing face »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim
Published 2019“…In this study, Meta Evolutionary–Firefly Algorithm (EMEFA) was initially developed to expedite the computational time in multi-DG installation with improved accuracy. …”
Get full text
Get full text
Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman
Published 2013“…This research presents an approach to solve the UC problem using a newly developed Multi-agent Evolutionary Programming incorporating Priority Listing optimisation technique (MAEP-PL). …”
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
Operating a reservoir system based on the shark machine learning algorithm
Published 2018“…The performance of the SMLA was compared with the performance of the most widespread evolutionary algorithms, namely, the genetic algorithm (GA). …”
Get full text
Get full text
Article -
14
-
15
Forecast of Muslimah fashion trends in Caca's company / Muhammad Saifullah Mohd Taip
Published 2023Get full text
Get full text
Student Project -
16
-
17
Pharmacy Management System (PhaMSys)/ Norfatin Liyana Yussof
Published 2016Get full text
Get full text
Thesis -
18
Student Luggage Storage System (SLSS) / Sofea Aida Sallehan
Published 2020Get full text
Get full text
Thesis -
19
Real time vein visualization using near-infrared imaging
Published 2020“…Evolutionary prototyping method is used to develop the system and to ensure the quality of the final system through a few prototype refinement cycles. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
Get full text
Get full text
Get full text
Article
