Search Results - (( java implementation mining algorithm ) OR ( program identification based algorithm ))
Search alternatives:
- implementation mining »
- identification based »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This thesis presents the Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission system. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
-
10
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
11
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A neural network based flow regime identifier program is developed in Matlab environment. …”
Get full text
Get full text
Thesis -
12
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article -
13
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…In conclusion, the finger vein identification hardware architecture based on KNCN classifier is successfully implemented on an FPGA board with faster processing time as compared with software-based implementation of KNCN classifier in MATLAB.…”
Get full text
Get full text
Thesis -
16
Simultaneous Network Reconfiguration and DG Sizing Using Evolutionary Programming and Genetic Algorithm to Minimize Power Losses
Published 2014“…This paper presents an effective method based on Evolutionary Programming (EP) and Genetic Algorithm (GA) to identify the switching operation plan for feeder reconfiguration and distributed generation size simultaneously. …”
Get full text
Get full text
Get full text
Article -
17
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…In this work, the fault signals measured at the utilities are extracted by the hyperbolic S-transform (HST) before going through the identification process. To carefully select coefficients of the HST representing fault transient signals and reduce the size of inputs for recognition algorithms, power-spectrum-based HST is adopted in this article to quantitatively transform the HST coefficients (HSTCs). …”
Get full text
Get full text
Get full text
Article -
18
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…The proposed method demonstrated a 69.01 % alignment when validated against the weighted sum method. Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
Radio Frequency Identification (RFID) Indoor Parking Control System
Published 2017“…The data will be exchange between the computer located at the gate and the sensors located at the garage through wireless RF ZigBee to clarify the empty parking place. Based on the data, the dynamic programming algorithm embedded in the system will determine the nearest parking location based on their entrance destination to the worker. …”
Get full text
Get full text
Article
