Search Results - (( java implementation mining algorithm ) OR ( basic orientation based algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- basic orientation »
- orientation based »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
10
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2021“…The basic idea is based on a geometrical analysis of a 3-link planar series manipulator in which there is an orientation angle boundary of a prescribed path. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…In this research, two algorithms have been proposed in which first algorithm is based on bipolar DC signals while second algorithm is based on field oriented control (FOC) principle. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Computerized simulation system for ECM radar system
Published 2007“…Finally before code generation, the flow chart of the simulation algorithm was used. The system is based on C++ Builder application; it has the capability of OO programming with the enhancement of Visual Component Library (VCL). …”
Get full text
Get full text
Get full text
Thesis -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
16
Fingerprint reconstruction based on improved directional image
Published 2005Get full text
Get full text
Thesis -
17
Aiding Low Cost Inertial Navigation With Building Heading For Pedestrian Navigation
Published 2024Article -
18
Sensorless induction motor speed control for electric vehicles using enhanced hybrid flux estimator with ann-ifoc controller
Published 2022“…Artificial neural network (ANN)-field-oriented control (FOC) was used in the hybrid flux system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
20
Reusing three-phase power-flow object components for unbalanced harmonic analysis
Published 2006“…The nonlinear devices such as six pulse converters are modeled as entity objects and inherited from the basic object-oriented power-system device model at fundamental frequency. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
