Search Results - (( java implementation mining algorithm ) OR ( basic complex machine algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- machine algorithm »
- mining algorithm »
- basic complex »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Particle swarm optimization (PSO) for CNC route problem
Published 2002“…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
10
Distance measure and its application to decision making, medical diagnosis, and pattern recognition problems under complex picture fuzzy sets
Published 2025“…Therefore, in this article, we introduced the notion of complex picture fuzzy sets and investigated their basic properties. …”
Article -
11
Cycle time minimization in production line using robust hybrid optimization algorithm
Published 2021“…The results obtained from their research have clearly portrayed the robustness of bio-inspired algorithms to cater complex problems. Assembly line, which is normally the last step of production that involves final assembly of the products. …”
Get full text
Get full text
Conference or Workshop Item -
12
Shot boundary detection based on orthogonal polynomial
Published 2019“…The design of SBD algorithms developed from simple feature comparison to rigorous probabilistic and using of complex models. …”
Get full text
Get full text
Get full text
Article -
13
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Bottleneck-based heuristic for permutation flowshop scheduling
Published 2017“…The previous study found that the scheduling activity become complex when dealing with large number of machine, m > 2, it is NP-hardness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Recent Advances in Classification of Brain Tumor from MR Images – State of the Art Review from 2017 to 2021
Published 2022“…In addition, the review paper will facilitate researchers who are new to machine learning algorithms for brain tumor recognition to understand the basics of the field and pave the way for them to be able to contribute to this vital field of medical research. …”
Get full text
Get full text
Get full text
Article -
16
Review of deep convolution neural network in image classification
Published 2017“…With the development of large data age, Convolutional neural networks (CNNs) with more hidden layers have more complex network structure and more powerful feature learning and feature expression abilities than traditional machine learning methods. …”
Get full text
Get full text
Get full text
Article -
17
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
18
Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza
Published 2021“…The extracted features are evaluated through six machine learning (ML) classifiers namely softmax, k-nearest neighbor (kNN), support vector machine, linear discriminant analysis, decision tree, and naive Bayes. …”
Get full text
Get full text
Get full text
Thesis -
19
HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text
Published 2021“…Our method works better than other basic and CNN and RNN based hybrid models. In the future, we will work for more levels of text emotions from long and more complex text.…”
Get full text
Get full text
Get full text
Article -
20
Handover Parameter for Self-optimisation in 6g Mobile Networks: A Survey
Published 2024journal::journal article
