Search Results - (( developing small interaction algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- interaction algorithm »
- implementation mining »
- java implementation »
- small interaction »
- developing small »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
10
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…For this reason, existing AI-based strategies have been confined to small interaction strengths (i.e., t≤3) and small test configurations. …”
Get full text
Get full text
Thesis -
11
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…Much previous research, while helpful, only investigated a small number of interaction strengths up to t = 6. …”
Get full text
Get full text
Get full text
Article -
12
Sequence t-way test generation using the barnacles mating optimizer algorithm
Published 2021“…Our experience with BSS is encouraging as we manage to match some of existing best test suite size for small interaction strength (t<5) with small number of event sequences (≤10). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
15
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Moreover, this prototype could be used as the basis for developing more advanced remote monitoring in term of performance to access and interact with mobile cloud, which is the future of mobile technology.…”
Get full text
Get full text
Thesis -
16
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011“…In this chapter, features have been extracted from hand posture closed contours, hand posture trajectory and hand position has been identifIed. Algorithms have been developed for extracting these features after segmenting the head and the two hands. …”
Get full text
Get full text
Get full text
Book Chapter -
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset
Published 2017“…User interaction is required to setup the segmentation parameters. …”
Get full text
Get full text
Monograph
