Search Results - (( java implementation mining algorithm ) OR ( pattern using drops algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- pattern using »
- using drops »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…In this thesis rain streak have been captured and isolated from the background scene by using an embossed filter algorithm designed to highlight the transparent rain streaks that cause the blur and distortion of the video, while the removing algorithm is based on a simple algorithm that correlates spatio-temporal and depth of an image into one technique. …”
Get full text
Get full text
Thesis -
9
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
Get full text
Get full text
Article -
10
-
11
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…The ANN model has been developed using resilient back-propagation learning algorithm. …”
Get full text
Get full text
Thesis -
12
Land Use Changes in Jeli, Kelantan
Published 2013“…Land use change pattern can be obtained via spatial analysis using Geographical Information System (GIS) and acquiring satellite imagery in remote sensing. …”
Get full text
Undergraduate Final Project Report -
13
Optimal Charging Strategy for Plug-in Hybrid Electric Vehicle Using Evolutionary Algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…The result shows that SIFT algorithm achieved a better recognition rate and extract more information and matching pairs compared to SURF algorithm. …”
Get full text
Get full text
Thesis -
15
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Our algorithms prolong the battery life by adjusting the base station using initial and final states. …”
Get full text
Get full text
Thesis -
16
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
17
Analyzing students records to identify patterns of students' performance
Published 2023“…Students' demographic and past academic performance data are then used to study the academic pattern. Early phases of the CRISP-DM methodology is also described in detail consisting business understanding, data understanding and data preparation. …”
Conference Paper -
18
A scene invariant convolutional neural network for visual crowd counting using fast-lane and sample selective methods
Published 2023“…Existing research usually follow the training-testing protocol within a single dataset and the accuracy drops when conducting cross-dataset evaluation. Density map prediction methodology is widely used but it has drawbacks in ground truth generation and the use of Euclidean distance results in low quality density map. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
Get full text
Get full text
Thesis -
20
Mixed convection in a lid-driven cavity in the presence of magnetic field with sinusoidal heating
Published 2024“…The governing equations are solved numerically using a SIMPLE algorithm with the finite volume method. …”
Get full text
Get full text
Get full text
Article
