Search Results - (( evolution integration concept algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- integration concept »
- java implementation »
- concept algorithm »
- mining algorithm »
- evolution »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review
Published 2023“…It highlights the advantages of hybrid models combining legged and wheeled mobility while stressing the importance of refining control frameworks, trajectory planning, and human-robot interactions. The concept of integrating soft and compliant mechanisms for improved adaptability and resilience is introduced. …”
Get full text
Get full text
Get full text
Article -
10
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The RBP algorithm has two layers, upper and lower. The upper layer of the RBP exploits the LTE frame concept that contains a number of sub-frames, whereas the lower layer of the RBP algorithm adopts the concept of a Proportional Fair (PF) algorithm to schedule the non-real time (NRT) flows, while an Exponential/Earliest Deadline (Exp/ED) algorithm is applied for the real time (RT) flows. …”
Get full text
Get full text
Thesis -
11
Agro-ento bioinformation: towards the edge of reality
Published 2002“…IPM Concept is a synthetic framework that results from evolution, revolution, and presently bioformation in domains of agro-medico-ecological and anthropo-ecological activities. …”
Get full text
Get full text
Inaugural Lecture -
12
The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis
Published 2025“…The study findings indicate a growing and broader trend towards the integration of metaheuristics and optimization algorithms, echoing the interdisciplinary nature of this domain. …”
Get full text
Get full text
Get full text
Article -
13
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
14
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Multi-directional matrix converter for low power application using field-programmable gate array
Published 2015“…This study also derived necessary equation for proposed modulation method as well as detail of analysis and modulation algorithm. The theoretical and modulation concepts have been verified in MATLAB simulation and experimental test.…”
Get full text
Get full text
Thesis
