Search Results - (( java application mining algorithm ) OR ( post implementation _ algorithm ))
Search alternatives:
- post implementation »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Crosssover-first different evolution: a comprehensive post- Hoc analysis
Published 2017“…Explore a new evolutionary optimization approach using Crossover-First Differential Evolution. Implementation details explained clearly with a comprehensive post-hoc statistical analysis to support the algorithm. …”
Get full text
Get full text
Book -
9
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
Get full text
Get full text
Thesis -
10
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
Get full text
Get full text
Thesis -
11
-
12
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
14
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…The shortest path routing is one of the well-known network analysis techniques implemented in road management systems. Pg Routing as an extension of Postgre SQL/Post GIS database is an open source library that implements the Dijkstra shortest path algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Application of artificial neural network for automatic contingency analysis in power security assessment / Ismail Musirin and Titik Khawa Abdul Rahman
Published 2006“…The ANN is developed in order to predict the post-outage severity index from a set of preoutage data set. …”
Get full text
Get full text
Get full text
Article -
16
Techniques and strategies to minimize radiation exposure in pediatric computed tomography (CT) abdominal examinations: a review
Published 2024“…To reduce the ionizing radiation dose while still obtaining high-quality diagnostic images, healthcare practitioners should adhere to DRL, adjust exposure factors, implement prefiltration, employ AI, and use post-processing algorithms.…”
Get full text
Get full text
Get full text
Article -
17
The effects of compiler optimizations in face recognition system
Published 2009Get full text
Article -
18
A Survey of metaheuristic approaches for curriculum based course timetabling problem
Published 2017“…Purpose - The aim of this paper is to explore approaches applied for solving CBCTT by presenting features of implementation related to it.The idea is to prepare references structure for future implementation.There are numerous surveys related to approaches in University course timetabling problem (UCTP) (Babaei, Karimpour, & Hadidi, 2014; Nandhini & Kanmani, 2009).Usually surveys that carried out involved post enrollment course timetabling problem (PECTT) and curriculum-based course timetabling problem (CBCTT) together in one literature. …”
Get full text
Get full text
Conference or Workshop Item -
19
Finger Exoskeleton for Early Acute Post Stroke Rehabilitation: Control Design and Performance Analysis
Published 2023“…Biochemical engineering; Controllers; Electronic medical equipment; Exoskeleton (Robotics); Heuristic methods; Patient rehabilitation; Three term control systems; Algorithm implementation; Closed-loop method; Exoskeleton devices; Exoskeleton mechanism; Performance analysis; Post-stroke rehabilitation; Rehabilitation devices; World Health Organization; Position control…”
Conference Paper -
20
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis
