Search Results - (( developing human computational algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- human computational »
- java implementation »
- developing human »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri
Published 2017“…The technique used to recognize human emotions is an AdaBoost algorithm as classifier. …”
Get full text
Get full text
Thesis -
9
Investigations On Human Perceptual Maps Using A Stereo-Vision Mobile Robot
Published 2018“…The outcomes indicate that the proposed computer vision techniques and computational mapping algorithms for human perceptual map building are robust and useful. …”
Get full text
Get full text
Thesis -
10
High performance visualization of human tumor growth software
Published 2008“…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…Thus, a new hybrid algorithm with higher accuracy of computation is developed in this project. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges
Published 2025“…Metaheuristic algorithms have emerged as promising techniques for optimizing human activity recognition (HAR) systems. …”
Get full text
Get full text
Get full text
Article -
14
HRI for interactive humanoid head Amir-II for visual tracking and servoing of human face.
Published 2011“…The algorithm developed in this research utilizes the capability offered by scientific computing program MATLAB along with its Image Processing Toolbox. …”
Get full text
Get full text
Article -
15
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
16
Implementation and Optimization of Human Tracking System Using ARM Embedded Platform
Published 2012“…Functions and library in OpenCV which developed by Intel Corporation was utilized for building the human tracking algorithms.…”
Get full text
Get full text
Conference or Workshop Item -
17
Development of classification algorithms of human gait
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
19
Metric's thresholds for encoding evolutionary computing representation in software engineering problem
Published 2015“…This paper presents metrics thresholds encoding algorithm as an alternative to replace human experts in developing problem representation. …”
Get full text
Get full text
Get full text
Article -
20
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The Internet of Things (IoT), which is defined as a network of interconnected computing devices, mechanical and digital machines, and objects with unique identifiers (UIDs), which are able to transmit data across a network without requiring human-to-human or human-to-computer interactions, is currently a hot topic in the scientific community. …”
Get full text
Get full text
Get full text
Thesis
