Search Results - (( java implementation mining algorithm ) OR ( its implementation challenges algorithm ))
Search alternatives:
- implementation mining »
- challenges algorithm »
- java implementation »
- its implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Design issues and challenges of an FPGA-based orthogonal matching pursuit implementation for compressive sensing reconstruction
Published 2020“…Due to OMP’s significant contribution, this paper presents an overview of the design issues and challenges of OMP algorithm implementation for CS reconstruction. …”
Get full text
Get full text
Conference or Workshop Item -
9
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…Autonomous navigation is an important feature in robotics as it provides mobile robot with the ability to traverse from one point to another point while avoiding any obstacles that lie within its path. One of the challenges is to reduce the complexity of the development of programs that can provide the pertaining artificial intelligence. …”
Get full text
Get full text
Conference or Workshop Item -
11
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Since the initial cost for using PV is high, it is essential to make the PV module to operate at its maximum power point (MPP). However, the non-linear relation between current and voltage for the PV system is a challengeable issue that results in a unique MPP for its power-voltage (P-V) curve. …”
Get full text
Get full text
Thesis -
12
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013“…Thus, the design of optimal distributed scheduling algorithm has remained a challenge for the last few decades. …”
Get full text
Get full text
Conference or Workshop Item -
14
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013“…Thus, the design of optimal distributed scheduling algorithm has remained a challenge for the last few decades. …”
Get full text
Get full text
Conference or Workshop Item -
15
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013“…Thus, the design of optimal distributed scheduling algorithm has remained a challenge for the last few decades. …”
Get full text
Get full text
Conference or Workshop Item -
16
SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION
Published 2024“…SCA has been widely used to address diverse optimization challenges in several domains. The advantages of SCA can be attributed to its simple implementation, reasonable execution time, and adaptability to hybridize with other optimization methods easily. …”
Get full text
Get full text
Get full text
Book Chapter -
17
Overload-state downlink resource scheduling and its challenges towards 5G networks
Published 2016Get full text
Get full text
Conference or Workshop Item -
18
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…Two types of navigation, maze navigation and grid following; were implemented by persons with minimum to intermediate programming skill; exhibiting the flexibility and ease of implementation of this technique.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…This project aims to study the CNN algorithm's efficacy in rabbit breed classification, develop a CNN-based prototype, and evaluate its accuracy. …”
Get full text
Get full text
Thesis
