Search Results - (( developing integrator perceptions algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- integrator perceptions »
- developing integrator »
- perceptions algorithm »
- implementation mining »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Risk perception modeling based on physiological and emotional responses / Ding Huizhe
Published 2024“…Therefore, accurate risk perception has become vital. This research aims to develop models for objectively assessing perceived risk. …”
Get full text
Get full text
Get full text
Thesis -
9
Modeling heterogeneous behaviors with different strategies in a terrorist attack
Published 2022“…We constructed an emotional model that integrated personality and visual perception for pedestrians. …”
Get full text
Get full text
Get full text
Article -
10
Digital Surface Model (DSM) Construction and Flood Hazard Simulation for Development Plans in Naga City, Philippines
Published 2007“…Finally the Digital Surface Model (DSM) of the study area was constructed by integrating both man-made and natural terrains. The DSM was also generated to simulate the new developments in Naga City. …”
Get full text
Get full text
Article -
11
-
12
Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli
Published 2018“…Based on the prosody analysis, a grammar-based prosody modification rules are proposed by integrating grammatical structure. Consequently, new rules and algorithm that is MustFront rule, limitation rule, and two-steps pitch contour algorithm are introduced to increase the synthesized speech quality. …”
Get full text
Get full text
Thesis -
13
A kinematic concept for robotic assisted dental rehabilitation / Muhammad Azmi Ayub... [et al.]
Published 2017“…The key elements in the concept consist of cone-beam computed tomography machine (CBCT), image processing algorithm and a robot manipulator system, which will function as an integrated unit to aid and guide the dentist in the diagnosis and treatment procedures. …”
Get full text
Get full text
Get full text
Article -
14
Quantifying and assessing post-stroke patients' functional capability level for independent daily activities: a review
Published 2025“…It delves into the existing standards of clinical assessment, explores the integration of sensors in limb rehabilitation prototypes, and observes the mathematical methods and algorithms employed by previous researchers to assess and quantify stroke patients' functional capability automatically. …”
Get full text
Get full text
Get full text
Article -
15
A rule-based image segmentation method and neural network model for classifying fruit in natural environment / Hamirul'aini Hambali
Published 2015“…Therefore, another segmentation method has been developed to address the problem. The new method, named as Adaptive K-means, is developed based on clustering approach. …”
Get full text
Get full text
Thesis -
16
-
17
Quantifying and assessing post-stroke patients' functional capability level for independent daily activities: a review
Published 2025“…It delves into the existing standards of clinical assessment, explores the integration of sensors in limb rehabilitation prototypes, and observes the mathematical methods and algorithms employed by previous researchers to assess and quantify stroke patients' functional capability automatically. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A real time deep learning based driver monitoring system
Published 2021Get full text
Get full text
Get full text
Article -
19
A review of automatic driving target detection based on camera and millimeter wave radar fusion technology
Published 2025“…Future research should focus on developing comprehensive multimodal datasets, 4D millimeter-wave radar, and refining fusion algorithms for robustness in diverse environments. …”
Get full text
Get full text
Get full text
Article -
20
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
Get full text
Get full text
Get full text
Get full text
Thesis
