Search Results - (( java implementation mining algorithm ) OR ( _ implementation challenges algorithm ))
Search alternatives:
- implementation mining »
- challenges algorithm »
- java implementation »
- mining algorithm »
- _ implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Design issues and challenges of an FPGA-based orthogonal matching pursuit implementation for compressive sensing reconstruction
Published 2020“…Due to OMP’s significant contribution, this paper presents an overview of the design issues and challenges of OMP algorithm implementation for CS reconstruction. …”
Get full text
Get full text
Conference or Workshop Item -
9
Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches
Published 2024“…In this review paper, a comprehensive review of mobile robot navigation algorithms has been conducted. The findings suggest that, even though the self-learning algorithms require huge amounts of training data and have the possibility of learning erroneous behavior, they possess huge potential to overcome challenges rarely addressed by the other traditional algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Implementation of an autonomous mobile robot navigation algorithm using C language
Published 2009“…The objective of the project is to develop navigation algorithm for the autonomous mobile robot. After that, implement the navigation algorithm on the mobile robot and without using the external sensor for navigation of the mobile robot to reach the specified point. …”
Get full text
Get full text
Final Year Project -
11
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
12
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013“…Thus, the design of optimal distributed scheduling algorithm has remained a challenge for the last few decades. …”
Get full text
Get full text
Conference or Workshop Item -
13
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013“…Thus, the design of optimal distributed scheduling algorithm has remained a challenge for the last few decades. …”
Get full text
Get full text
Conference or Workshop Item -
14
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013“…Thus, the design of optimal distributed scheduling algorithm has remained a challenge for the last few decades. …”
Get full text
Get full text
Conference or Workshop Item -
15
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Intruder detection using histogram and edge detection algorithms
Published 2016Get full text
Get full text
Undergraduates Project Papers -
17
CAR TRACTION CONTROL SYSTEM
Published 2007“…This project explores the potential of implementing fuzzy logic algorithm for traction control system using VHDL. …”
Get full text
Get full text
Final Year Project -
18
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…Two types of navigation, maze navigation and grid following; were implemented by persons with minimum to intermediate programming skill; exhibiting the flexibility and ease of implementation of this technique.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
Article -
20
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
