Search Results - (( java implementation mining algorithm ) OR ( from implementation force algorithm ))
Search alternatives:
- implementation mining »
- implementation force »
- java implementation »
- from implementation »
- mining algorithm »
- force algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
9
Magnetic Optimization Algorithm Approach For Travelling Salesman Problem
Published 2012“…In this implementation, each magnetic agent or particle in Magnetic Optimization Algorithm represents a candidate solution of the Travelling Salesman Problem. …”
Get full text
Get full text
Conference or Workshop Item -
10
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
Get full text
Get full text
Thesis -
12
-
13
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…Feature selection for IDS is a fundamental step in detection procedure and aims to eliminate some irrelevant and unneeded features from the dataset. This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Application of inerter in passenger vehicle suspension systems / Soong Ming Foong
Published 2015“…Then, switching algorithms were implemented to the inerter to evaluate potential further ride performance improvement brought by these modifications. …”
Get full text
Get full text
Thesis -
15
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…This eventually brought the study to the implementation of the Inverse Single Drop Multistage (ISDMS)-2D Fuzzy Algorithm on the Mass Transfer of Multiple Drops in Multistage System. …”
Get full text
Get full text
Thesis -
16
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
17
Development of airbag suit system for motorcyclist
Published 2014“…The system takes the inputs from IMUs and GPS for G-force and speed calculation. …”
Get full text
Get full text
Get full text
Article -
18
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
20
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis
