Search Results - (( developing online method algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- developing online »
- method algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Development of online appointment system using forward chaining algorithm for Student and lecturer in FTMSK / Sharizal Sharif
Published 2007“…Methodology approach used for progression phase is SDLC method and used Decision Support System model to design and develop the system prototype. …”
Get full text
Get full text
Thesis -
9
MuDi-Stream: A multi density clustering algorithm for evolving data stream
Published 2016“…In this paper, a new method, called the MuDi-Stream, is developed. It is an online-offline algorithm with four main components. …”
Get full text
Get full text
Article -
10
Position control of robot manipulator: Design a novel SISO adaptive sliding mode fuzzy PD fuzzy sliding mode control.
Published 2011“…To attenuate the chattering phenomenon this method developed a linear boundary layer and the parameter of the sliding function is online tuned by adaptation laws. …”
Get full text
Get full text
Article -
11
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…The proposed method, which is called MuDi-Stream (Multi Density clustering algorithm for evolving data Stream), is an online-offline algorithm with four main components. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…Therefore, agile development methodology is very useful method to make the system successful and can be developed according to the schedule. …”
Get full text
Get full text
Thesis -
14
-
15
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
16
Phishing attack detection using machine learning method
Published 2019“…The study of this algorithm is made thoroughly and the methods in implementing this algorithm have been discussed in detail. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…It is known as conflation methods. One of well-known conflation methods is stemming algorithms, where it is used to identify morphological variants. …”
Get full text
Get full text
Thesis -
18
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…The WNMPC is developed by a proposed algorithm named adaptive updating rule (AUR) used with gradient descent optimization method to minimize a constrained cost function over the prediction and control horizons and to offer a robust control performances. …”
Get full text
Get full text
Thesis -
19
Time-variant online auto-tuned pi controller using pso algorithm for high accuracy dual active bridge dc-dc converter
Published 2022“…This paper proposes a time-variant online auto-tuned PI controller using a particle swarm optimization (PSO) algorithm for the 200 kW DAB system. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Analysis of Travellers’ Online Reviews in Social Networking Sites Using Fuzzy Logic Approach
Published 2019“…To develop the recommendation method, we use clustering and prediction machine learning techniques. …”
Get full text
Get full text
Article
