Search Results - (( java implementation mining algorithm ) OR ( pattern line efficient algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- line efficient »
- pattern line »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Comparative analysis of line search methods in the Steepest Descent algorithm for unconstrained optimization problems / Ahmad Zikri Shukeri, Puteri Qurratu Ain Megat Sulzamzamendi...
Published 2024“…The result from this study is choosing FMRI algorithm using exact line search to get faster convergence rate which means that the algorithm achieves a high level of accuracy in fewer iterations compared to using other algorithms and inexact line search.…”
Get full text
Get full text
Student Project -
9
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
Published 2021“…There are various methods for watermark embedding, which mapping pattern is one of them. The aim is to validate and compare the SCAN pattern for digital watermarking in order to produce a fast and efficient authentication algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi ... [et al.]
Published 2023“…Business owners can gain an understanding of customer flow by analysing flow patterns. Queuing theory is an area of mathematics concerned with the study and modelling the behaviour of waiting in lines (Whiting,2012). …”
Get full text
Get full text
Article -
11
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Thus, Maio and Maltoni (1997) proposed a method to detect minutiae in gray scale fingerprint images based on ridge line following algorithm, which is to trail the ridge line according to the fingerprint directional image. …”
Get full text
Get full text
Thesis -
12
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…This algorithm was proposed in this thesis based on a special mathematical calculation model, which has the ability to decide the spacing between adjacent straight-line trajectories within a user defined area, this prevents the quadcopter from crashing during the survey due to reasons of overcapability. …”
Get full text
Get full text
Thesis -
13
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
Get full text
Get full text
Get full text
Article -
14
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…Vein biometric system uses the pattern of veins in the human body as a unique identification. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Trajectory Tracking Of A Mobile Robot System
Published 2017“…In conclusion, the experimental results show that the mobile robot able to reach the target destination successfully without the collision with obstacles, for different types of trajectory patterns using the masking tape width of 18mm with the develop algorithm.…”
Get full text
Get full text
Get full text
Article -
17
Trajectory tracking of a mobile robot system / Mariam Md Ghazaly...[et al.]
Published 2017“…In conclusion, the experimental results show that the mobile robot able to reach the target destination successfully without the collision with obstacles, for different types of trajectory patterns using the masking tape width of 18mm with the develop algorithm.…”
Get full text
Get full text
Get full text
Article -
18
Handwriting Recognition Using Artificial Neural Network
Published 2004“…This network is trained using the Back-Propagation algorithm to identify similarities and patterns among different handwriting samples. …”
Get full text
Get full text
Final Year Project -
19
Coil geometry models for power loss analysis and hybrid inductive link for wireless power transfer applications
Published 2018“…Then, WPT system is demonstrated with the inclusion of Maximum Power Point Tracking algorithm for improving efficiency. The schematic of flux generation of both in the transmitter and receiver sections are demonstrated and analyzed graphically. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
