Search Results - (( java implementation mining algorithm ) OR ( program estimation techniques algorithm ))
Search alternatives:
- implementation mining »
- estimation techniques »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…The extended MILP technique is able to provide an automatic security estimation tool by giving accurate results. …”
Get full text
Get full text
Get full text
Article -
8
System identification using Extended Kalman Filter
Published 2017“…The EKF algorithm performance was compared with Recursive Least Square (RLS) estimation algorithm as a comparison algorithm performance. …”
Get full text
Get full text
Student Project -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin.
Published 2004“…A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
Get full text
Get full text
Thesis -
13
Power System State Estimation In Large-Scale Networks
Published 2010“…This thesis describes a pre-screening process to identify the bad measurements and the measurement weights before performing the WLS estimation technique employed in SE. The autoregressive (AR) techniques. …”
Get full text
Get full text
Thesis -
14
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This algorithm is used to estimate the maximum loadability point in power system. …”
Get full text
Get full text
Thesis -
15
Estimating the direction of arrival of the multipath radio signal using Capon technique / Haslinah Ruslan
Published 1996“…The comparison of performance between Bartlett Beamforming and Capon technique in DOA estimation based on actual measured data is presented. …”
Get full text
Get full text
Thesis -
16
Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain
Published 2014“…This thesis presents research on voltage and load profiles estimation using independent component analysis technique. …”
Get full text
Get full text
Thesis -
17
-
18
Design Optimization of 3-Phase Rectifier Power Transformers by Genetic Algorithm and Simulated Annealing
Published 2008“…A closed form expression for actual phase current waveform of the rectifier transformer is used and a comparison is made with the approximate waveform normally considered for fixing the transformer rating. Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
Get full text
Get full text
Citation Index Journal -
19
Design Optimization of 3-phase rectifier power transformers by Genetic Algorithm and Simulated Annealing
Published 2008“…A closed form expression for actual phase current waveform of the rectifier transformer is used and a comparison is made with the approximate waveform normally considered for fixing the transformer rating. Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
Get full text
Get full text
Citation Index Journal -
20
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…The algorithm with the least estimation error is selected for optimization. …”
Get full text
Get full text
Thesis
