Search Results - (( developing formative techniques algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- developing formative »
- formative techniques »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
-
9
Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations
Published 2013“…This paper investigates the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem. In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
Get full text
Get full text
Article -
10
Development of a mathematical model for the prediction of chip formation instability and its verification by fuzzy logic with genetic algorithm
Published 2010“…In this technique, a mathematical model has been developed between the cutting parameters and the instability frequency of the chip serration based on response surface methodology and the model is verified by fuzzy logic with genetic algorithm.…”
Get full text
Get full text
Get full text
Article -
11
A Comparative Study on Compression of Different Image File Formats
Published 1999“…In this project, an image compression format and algorithm has been analyses. A system has been created for user to convert or display image file format. …”
Get full text
Get full text
Thesis -
12
BASE: a bacteria foraging algorithm for cell formation with sequence data
Published 2010“…The bacteria foraging algorithm (BFA) is a newly developed computation technique extracted from the social foraging behavior of Escherichia coli (E. coli) bacteria. …”
Get full text
Get full text
Get full text
Article -
13
Improvement and application of particle swarm optimization algorithm
Published 2025“…This method combines CPTD with the Genetic Algorithm and PSO (GAPSO), resulting in an effective strategy for dynamic formation reconfiguration and path optimization. …”
Get full text
Get full text
Article -
14
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
15
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Thus, some phases of SDLC were used and the chosen phases such as requirement analysis, design, development, evaluating and documentation. This project are focuses on the FitwithTrainer android application with auto-formation group chatting as it is use geofencing technique in GPS to detect the nearest users. …”
Get full text
Get full text
Student Project -
16
Development of a hydrate formation prediction model for sub-sea pipeline
Published 2017“…In this research work, a novel model is developed to the hydrate formation pressure and hydrate formation temperature for a single component of methane (CH4) gas. …”
Get full text
Get full text
Article -
17
A Comparative Study of Some Cellular Manufacturing Techniques
Published 2000“…Overall, Bond Energy Algorithm (BEA) was found to be the best cell formation technique.…”
Get full text
Get full text
Article -
18
Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman
Published 2012“…The objective of this project is to study the various techniques to develop online jigsaw puzzle games. Based on the initial study, the Backtracking algorithm has been chosen as the most suitable algorithm to be used to develop the jigsaw puzzle according to available time and complexity of the algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Feature-based stereo vision relative positioning strategy for formation control of unmanned aerial vehicles
Published 2019“…In addition, several different techniques and approaches for developing the algorithm is discussed as well. …”
Get full text
Get full text
Article
