Search Results - (( java implementation mining algorithm ) OR ( program affecting detection algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- affecting detection »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…It also assists parents in preparing their ASD-affected children for primary school by suggesting appropriate assistance options like Program Pemulihan Dalam Komuniti (PDK), Program Pendidikan Khas Integrasi (PPKI), and Program Pendidikan Inklusif (PPI). …”
Get full text
Get full text
Thesis -
9
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. The approach is based on optimization of selected test case from test suite T. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
Get full text
Get full text
Article -
12
Quality checking and inspection based on machine vision technique to determine tolerancevalue using single ceramic cup
Published 2017“…The design of the algorithm is to detect the sign of defect when a sample of the product is used for inspection purposes. …”
Get full text
Get full text
Get full text
Article -
13
Quality checking and inspection based on machine vision technique to determine tolerance value using single ceramic cup
Published 2016“…The development of an algorithm for inspection and quality checking using machine vision was discussed in this paper, in which the design of the algorithm is to detect the sign of defect when a sample of the product is used for inspection purposes. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…The results show that the average delay is not much affected by the implementation of the program. The network performance is greatly affected by the number .of packet present in the network at any given time. …”
Get full text
Get full text
Thesis -
16
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…The challenge in regression testing is the selection of best test cases from the existing test suite.This paper presents an evolutionary regression test case prioritization for object-oriented software based on extended system dependence graph model of the affected program using genetic algorithm. The approach is based on optimization of selected test case from dependency analysis of the source codes. …”
Get full text
Get full text
Article -
17
-
18
-
19
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
20
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…This research developed an improved technique for object recognition and space occupancies determination which not affected by the orientation of the subject. This project also implements colored object recognition technique using its color and size without edge detection process along with a self-calibration technique for detecting object location without any parameter of the camera by using only two reference points. …”
Get full text
Get full text
Get full text
Get full text
Thesis
