Search Results - (( identification implementation case algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- identification implementation »
- implementation mining »
- implementation case »
- java implementation »
- mining algorithm »
- case algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…In this case, the algorithm of the DIS operator is embedded with the Marker-based Watershed segmentation as the assistance of Marker-based Watershed Segmentation is effective in extracting the individual significant edges features produced by DIS operator. …”
Get full text
Get full text
Thesis -
9
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
10
-
11
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…A CNN model is then implemented with Adam optimizer. The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
Get full text
Get full text
Thesis -
13
-
14
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…In addition, the structural parameters of a system can be accurately estimated through the proposed system identification methods for both cases of linear and nonlinear conditions. …”
Get full text
Get full text
Get full text
Thesis -
15
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
16
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article -
17
Human gait recognition and classification using similarity index for various conditions
Published 2013“…Our aim is to implement the traditional gait recognition algorithm and to show the variation in gait recognition when subject is observed parallel to camera under three conditions- walking normal, carrying a bag and wearing a coat. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Human gait recognition and classification using similarity index for various conditions
Published 2013“…Our aim is to implement the traditional gait recognition algorithm and to show the variation in gait recognition when subject is observed parallel to camera under three conditions- walking normal, carrying a bag and wearing a coat. …”
Get full text
Get full text
Get full text
Article -
19
-
20
SEMANTIC ROLE LABELING (SRL) FOR THE DISAMBIGUATION OF NATURAL LANGUAGE PROCESSING (NLP) SYSTEMS IN LOW-RESOURCED LANGUAGES AS KYRGYZ LANGUAGE
Published 2024“…Which started in accordance with Chomsky's Universal grammar theory to analyze language via algorithms which were implemented according to the language syntactical structure. …”
Get full text
Get full text
Get full text
Article
