Search Results - (( developing policy evolution algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- evolution algorithm »
- java implementation »
- developing policy »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia
Published 2024“…Principle component analysis was used to determine which predictors were most reliable. Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. …”
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Proposed algorithm for scheduling in computational grid using backfilling and optimization techniques
Published 2016“…To allocate the suitable resources for the incoming jobs, a scheduling algorithm has to manage this process.In this paper, we provide a critical review the recent mechanisms in “grid computing” environment.In addition, we propose a new scheduling algorithm to minimize the delay for the end user, Gap Filling policy will be applied to improve the performance of the priority algorithm.Then, an optimization algorithm will perform in order to further enhance the initial result for that obtained from backfilling mechanism.The main aim of the proposed scheduling mechanism is to improve the QoS for the end user in a real grid computing environment.…”
Get full text
Get full text
Get full text
Article -
10
Agro-ento bioinformation: towards the edge of reality
Published 2002“…The protocols range from the molecular levels to domains of larger dimensions such as those encompassing fraternities of politics and policies, and societal applications. These protocols, algorithms, and visualisations undergo dynamic incubation processes to produce the end product, which is bioinformation. …”
Get full text
Get full text
Inaugural Lecture -
11
Conclusion
Published 2019“…The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Autonomous formation flight control of multiple UAVs with motion capture system
Published 2013“…If the leader were nonfunctional, the whole system will be nonfunctional. There is no policy of algorithm were by the leader's task can be pass to other quad-rotor UAV. …”
Get full text
Get full text
Thesis -
13
