Search Results - (( developing reflection path algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- developing reflection »
- implementation mining »
- java implementation »
- mining algorithm »
- reflection path »
- path algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…This project aims to determine locations of the node that reflect all the items in the list, build the route by connecting nodes and evaluate the proposed algorithm for the single source shortest path problem. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment
Published 2019“…There are two issues related to ASV autonomous riverine navigation; river environment modelling and autonomous path planning and obstacles avoidance. Thus, the objectives of the research are: to develop a riverbanks identification algorithm for ASV navigation; and to develop a marine traffic rules compliant navigation and obstacles avoidance algorithm for ASV in the unstructured riverine environment. …”
Get full text
Get full text
Thesis -
10
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
Get full text
Get full text
Get full text
Thesis -
11
Fingerprint frontier: the evolution of biometric security
Published 2023“…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
Get full text
Get full text
Get full text
Book -
12
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…We preprocessed the RDF graph to be stored in distributed manner after the elimination of single chain productions in order to increase the efficiency in conversion process. We used the shortest path algorithms to be called on certain resources to explore connectivity to reduce complexity of search. …”
Get full text
Get full text
Thesis -
13
Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images
Published 2015“…Moreover, the spline transformation produces RMSE 1.1 × 10-6 m. A new technique is developed to improve the automatic extraction of control points. …”
Get full text
Get full text
Thesis
