Search Results - (( java extraction method algorithm ) OR ( its implementation model algorithm ))
Search alternatives:
- implementation model »
- its implementation »
- extraction method »
- method algorithm »
- java extraction »
- model algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
3
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…In this report, it analyzes an application of repetitive control algorithm that deal with periodic disturbance.. To investigates the possibility of using a truncated finite impulse response (FIR) model approximation to implement a well-known gradient type repetitive control algorithm. …”
Get full text
Get full text
Student Project -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
7
An enhanced feed-forward neural networks and a rule-based algorithm for predictive modelling of students' academic performance
Published 2016“…But sometimes, it has challenges of over-fitting, especially when fitting models from massive data of varied data points. This necessitates its enhancement in order to strengthen its performance. …”
Get full text
Get full text
Thesis -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
9
Dynamic traffic scheduling and resource reservation algorithms for output-buffered switches
Published 2002“…Scheduling algorithms implemented in Internet switches have been dominated by the best-effort and guaranteed service models. …”
Get full text
Get full text
Thesis -
10
Load Balancing Using The Consensus Control Algorithm For A Network Server System
Published 2016“…An average consensus algorithm using PID control is proposed for the implementation in a network of server nodes and the result is compared to an existing model. …”
Get full text
Get full text
Thesis -
11
-
12
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
Get full text
Get full text
Thesis -
13
Training functional link neural network with ant lion optimizer
Published 2020“…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Research Report -
15
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Its performance in terms of frequency and throughput is compared with other MD5 implementations. …”
Get full text
Get full text
Get full text
Article -
16
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…The primary concern is to acquire the clear picture of the implementation of Multi-Objective Genetic Algorithm and the essential of variable valve timing effects on the engine performances in various engine speeds. …”
Get full text
Get full text
Proceeding Paper -
19
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…The project successfully achieved its objectives by analyzing the literature, developing the decision tree algorithm, and evaluating the accuracy of the model. …”
Get full text
Get full text
Thesis -
20
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis
