Search Results - (( java implementation mining algorithm ) OR ( graphic presentation modified algorithm ))
Search alternatives:
- implementation mining »
- graphic presentation »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Face detection system based on feature-based chrominance colour information
Published 2004Get full text
Get full text
Get full text
Book Section -
9
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…Some computer simulation results are presented to justify the need for this modified method of analysis. …”
Get full text
Get full text
Get full text
Article -
10
Wastewater treatment process: a modified model for oxidation pond
Published 2021“…The purpose of this thesis is to present the relationship between the concentration of bacteria, which are phototrophic and coliform, chemical oxygen demand (COD), and dissolved oxygen (DO) in the form of modified mathematical model. …”
Get full text
Get full text
Thesis -
11
Accurate numerical treatment on a stochastic SIR epidemic model with optimal control strategy
Published 2022“…The analytic-numeric New Iterative Method failed to deliver accurate solution for the large time domain. A new reliable algorithm based on NIM, the coupling of the Laplace transforms, and the New Iterative method is called Modified New Iterative Method (MNIM) which is presented to enhance the validity domain of NIM techniques. …”
Get full text
Get full text
Get full text
Article -
12
Computation of Maass Cusp Forms on Singly Punctured Two-Torus and Triply Punctured Two-Sphere Using Mathematica
Published 2009“…Hejhal developed an algorithm to compute Maass cusp form on triangle groups. …”
Get full text
Get full text
Thesis -
13
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000“…As a consequence, there is a need to extract information from existing system implementations and reason architecturally about this information. This research presents a reverse engineering tool VOO++ that will read an Object- Oriented C++ source code using UML notation in order to visualise its Class structure and the various relationships that may exist including, inheritance, aggregation, and dependency relationships based on the modified Cohen-Sutherland clipping algorithm. …”
Get full text
Get full text
Thesis -
14
Some numerical methods for temperature and mass transfer simulation on the dehydration of herbs
Published 2010“…This study focuses on the implementation of sequential algorithms on the simulation. 3D geometric visualization by COMSOL Multiphysics and graphical numerical results of FDM approximation in mass and heat transfer demonstrate the results of this study. …”
Get full text
Get full text
Article -
15
VOBcal: variant of bracketing method calculator
Published 2023“…Therefore, the use of a graphical user interface, which can provide a user-friendly method of entering parameters and presenting results, is one approach to solve this. …”
Get full text
Get full text
Book Section -
16
-
17
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
Get full text
Get full text
Thesis
