Search Results - (( developing large generation algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- generation algorithm »
- java implementation »
- developing large »
- large generation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints
Published 2015“…Therefore, it can be stated that the genetic algorithm approach developed in this study is efficient in solving large scale vehicle routing problem subject to precedence constraints with the objective of minimizing the distance travelled.…”
Get full text
Get full text
Get full text
Article -
9
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Maximizing power generation in variable speed micro-hydro with power point tracking
Published 2022“…As such, this paper aims to explore and develop a feasible maximum power point tracker (MPPT) with perturb and observe (P&O) and genetic algorithm (GA) in providing optimal power generation for variable speed micro-hydro system. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
11
Test case minimization applying firefly algorithm
Published 2018Get full text
Get full text
Get full text
Article -
12
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
13
Methodology to develop heuristic for re-entrant flow shop with two potential dominant machines using bottleneck approach
Published 2012“…Two generalised makespan algorithms using bottleneck approach were developed for the identified bottleneck. …”
Get full text
Get full text
Article -
14
Data discovery algorithm for scientific data grid environment
Published 2005“…We investigate these algorithms using our Grid Simulator developed using PARSEC. …”
Get full text
Get full text
Get full text
Article -
15
Dynamic Economic Dispatch For Power System
Published 2016“…The performance of the PSO-based developed algorithm was tested on simple case studies with a small number of generation units and limited constraints, and then on more complex case studies with a large number of variables and complicated constraints. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
Get full text
Get full text
Get full text
Article -
17
-
18
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
19
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The final problem is the ability of the algorithm to solve large-scale problems, which mostly are the real world problems. …”
Get full text
Get full text
Thesis -
20
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
Published 2019“…A workflow generator was developed to generate large task graphs randomly and scheduled the parallel applications. …”
Get full text
Get full text
Get full text
Get full text
Article
