Search Results - (( java implementation mining algorithm ) OR ( basic evaluation using algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- basic evaluation »
- evaluation using »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Routing performance enhancement in hierarchical torus network by link-selection algorithm
Published 2005“…We evaluate the dynamic communication performance of an HTN using dimension-order routing and link-selection algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
9
Dynamic communication performance enhancement in hierarchical torus network by selection algorithm
Published 2012“…The dynamic communication performances of an HTN is evaluated by using dimension-order routing and proposed adaptive routing algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
10
Adaptive routing algorithms and implementation for TESH network
Published 2013“…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
Get full text
Get full text
Get full text
Article -
11
Butterfly traffic pattern in selection algorithm on hierarchical torus network
Published 2015“…In this paper, we have evaluated the dynamic communication performances of an HTN is evaluated by using dimension-order routing and LS+CS algorithm under butterfly traffic pattern. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
Get full text
Get full text
Get full text
Article -
13
High performance hierarchical torus network under matrix transpose traffic patterns
Published 2004“…In this paper, we present a deadlock-free routing algorithm for the HTN using virtual channels and evaluate the network’s dynamic communication performance under matrix transpose traffic, using the proposed routing algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
15
Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation
Published 2015“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Book Chapter -
16
Evaluation Of Stereo Matching Algorithms And Dynamic Programming For 3D Triangulation
Published 2014“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Get full text
Book Chapter -
17
The non-uniform communication performance of adaptive routing for hierarchical interconnection network for 3D VLSI
Published 2015“…this paper, we have evaluated the dynamic performance of a TESH network using different non uniform traffic patterns. …”
Get full text
Get full text
Get full text
Article -
18
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
19
High performance hierarchical torus network
Published 2012“…The static network performances are derived from the graph model and the DCP is evaluated by using dimension-order routing and newly proposed adaptive routing algorithms under various traffic patterns. …”
Get full text
Get full text
Proceeding Paper -
20
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project
