Search Results - (( java implementation mining algorithm ) OR ( basic recent selection algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- selection algorithm »
- mining algorithm »
- recent selection »
- basic recent »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
An application of barnacles mating optimizer algorithm for combined economic and emission dispatch solution
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Recent Advances in Classification of Brain Tumor from MR Images – State of the Art Review from 2017 to 2021
Published 2022“…In addition, the review paper will facilitate researchers who are new to machine learning algorithms for brain tumor recognition to understand the basics of the field and pave the way for them to be able to contribute to this vital field of medical research. …”
Get full text
Get full text
Get full text
Article -
11
A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana
Published 2018“…In recent times, speech technology and its related applications are becoming a popular topic among researchers. …”
Get full text
Get full text
Get full text
Thesis -
12
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…The literature is replete with many localization and calibration algorithms that basically rely on some a-priori chosen nodes, called seeds, with known coordinates to help determine the network topology. …”
Get full text
Get full text
Thesis -
13
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…Digital image compression based on the ideas of subband decomposition or discrete wavelet transform (DWT) has received much attention in recent years. In fact, wavelet refers to a set of basic function, which is recursively defined form, a set of scaling coefficients and scaling function. …”
Get full text
Get full text
Thesis -
14
Comparative study of 3D reconstruction methods from 2D sequential images in sports
Published 2020“…The process of 3D reconstruction is a basic problem in Computer Vision. However, recent researches have been successfully addressed by motion capture systems with body worn markers and multiple cameras. …”
Get full text
Get full text
Get full text
Article -
15
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
16
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…This mechanism increases the life of the node and of the overall network. In the recent era, researchers used different routing algorithms to decrease the power consumption in order to increase the wireless sensor network life. …”
Get full text
Get full text
Conference or Workshop Item -
17
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…In the other word the algorithm improved unstructured P2P search's scalability, efficiency and reliability. …”
Get full text
Get full text
Thesis -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
A comparative analysis of machine learning approaches in sukuk price estimation across global regions
Published 2024“…The methodology for literature selection involves a systematic search of academic databases and scholarly repositories, focusing on recent publications within the last five years. …”
Get full text
Get full text
Get full text
Article
