Search Results - (( java implementation mining algorithm ) OR ( basic location method algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- method algorithm »
- location method »
- basic location »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…A heuristic method known as genetic algorithm is used to seek the optimum location and setting of these controllers where there are some works related to this case using various techniques. …”
Get full text
Get full text
Thesis -
9
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
10
A hybrid range-free algorithm using dynamic communication range for wireless sensor networks
Published 2020“…Distance-Vector Hop (DV-Hop) is a representative range-free localization algorithm, which is widely utilized to locate node position in location-based application. …”
Get full text
Get full text
Get full text
Article -
11
Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators
Published 2023“…A method based on Electromagnetism-Like algorithm (EM) and Genetic Algorithm (GA) is proposed to determine the time-optimal task scheduling for dual robot manipulators. …”
Conference paper -
12
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
13
Mathematical formulation of tabu search in combinatorial optimization
Published 2008“…CARP is known to be Non-deterministic Polynomialtime hard (NP-hard) where solutions are obtained through heuristic methods. Tabu Search (TS) is a heuristic method based on the use of prohibition-based techniques and basic heuristics algorithms like local search. …”
Get full text
Get full text
Monograph -
14
Wifi positioning system / Amalina Abdul Halim
Published 2006“…This paper present the experimental results that demonstrate the ability of Wifi Positioning system to estimate location of the devices using K-NN algorithm and result in application part is shown based on highest percentage accuracy of time taken to intend bus stop.…”
Get full text
Student Project -
15
Review of fault location methods for distribution power system
Published 2009Get full text
Get full text
Get full text
Article -
16
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…The coding scheme jointly considers task execution location and data transportation order. Simulation experiments reveal that FR-MOS outperforms the basic MOS over the PSO algorithm.…”
Get full text
Get full text
Article -
17
INDOOR LOCATION SENSING USING RADIO FREQUENCY NETWORK
Published 2007“…The benefit of this project is that it provides a foundation in the basic of locating objects in a closed area. The flowchart for the main program and hence, the programming of the calculations algorithm has been done and tested using user simulated digital control input. …”
Get full text
Get full text
Final Year Project -
18
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…As a result, we achieve a robust and efficient high-dimensional procedure for computing location and scatter matrix estimates and a powerful outlier detection method. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Avoiding under-reaching in twin circuit lines without residual current input from the parallel line
Published 2023Conference Paper
