Search Results - (( java implementation mining algorithm ) OR ( pattern reading pattern algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- pattern algorithm »
- mining algorithm »
- pattern reading »
- reading pattern »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. These algorithms could not compensate for the change or variation on the inspected parts dynamically. …”
Get full text
Get full text
Thesis -
7
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017“…Through the analysis of the fault patterns and other algorithm, it was found that multiple read operation within a single MARCH element from MARCH-NU algorithm can aid in the identification of the Read Destructive Fault whereas having HOLD time in the MARCH 9N algorithm would expose the Data Retention Fault. …”
Get full text
Get full text
Thesis -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A feasibility study of using an Electronic Nose as a fruit ripeness measuring instrument
Published 2009Get full text
Working Paper -
10
MELODY TRAINING WITH SEGMENT-BASED TILT CONTOUR FOR QURANIC TARANNUM
Published 2021“…A tarannum training prototype is built to test similarity between a userâ��s recitation and the trained patterns. To identify similarity between a pair of verse-contours, the application employs a shape-based contour similarity algorithm. …”
Get full text
Get full text
Article -
11
Segmentation of Malay syllables in connected digit speech using statistical approach
Published 2008“…Patterns used in this experiment are connected digits of 11 speakers spoken in read mode in lab environment and spontaneous mode in classroom environment. …”
Get full text
Get full text
Get full text
Article -
12
An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing
Published 2014“…Out of five types of staining patterns nucleolar and centromere share similar visual appearance and the same is true to homogeneous, fine-speckled, coarse-speckled patterns. …”
Get full text
Get full text
Final Year Project -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals
Published 2024“…It was also identified that the frequently performed exploratory procedures among participants were contour following and lateral motions. However, their reading strategies were too random and lacked systematic patterns. …”
Get full text
Get full text
Get full text
Article -
15
Recent applications in quantitative methods and information technology
Published 2018“…The analyses in each chapter are explained in detail with samples of real applications in daily life to assist readers to appreciate theoretical, algorithm and mathematical formulations.Prior to reading this book, readers are advised to have some basic foundation in statistical sampling, tabu search approach, neural network, algorithms, and mathematical formulation. …”
Get full text
Get full text
Book -
16
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
Get full text
Get full text
Thesis -
17
Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems
Published 2025“…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
Get full text
Get full text
Get full text
Article -
18
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
Get full text
Get full text
Thesis -
19
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
Get full text
Get full text
Thesis -
20
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
Get full text
Get full text
Undergraduates Project Papers
