Search Results - (( java implementation mining algorithm ) OR ( program scheme based algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- program scheme »
- scheme based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
WSN sensor node placement approach using Territorial Predator Scent Marking Algorithm (TPSMA)
Published 2023“…The performance of the proposed technique is then compared with other two sensor node placement schemes that are based on Integer Linear Programming (ILP) in terms of coverage ratio, connectivity and energy consumption. …”
Conference paper -
9
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. …”
Get full text
Get full text
Thesis -
10
A non-linear programming-based similarity reasoning scheme for modelling of monotonicity-preserving multi-input fuzzy inference systems
Published 2012“…As such, a Non-Linear Programming (NLP)-based SR scheme for constructing a monotonicity-preserving multi-input FIS model is proposed. …”
Get full text
Get full text
Article -
11
-
12
-
13
A De-noising Scheme for Enhancing Power Quality Problem Classification System Based on Wavelet Transform and Rule-Based Method
Published 2011“…To test the effectiveness of the denoising scheme, the system is tested with noise-added disturbance signals generated by MATLAB programming language and some field data obtained from the PQDIF resource centre. …”
Get full text
Conference or Workshop Item -
14
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The image processing toolbox of the MATLAB (version 7) is used to develop programs based on the lifting scheme for multiresolution representation of terrain. …”
Get full text
Get full text
Thesis -
15
Computational intelligence based technique for congestion management and compensation scheme in power system / Nur Zahirah Mohd Ali
Published 2019“…CEPSO integrates the element of cloning and swarm in the original Evolutionary Programming algorithm. CEPSO is initially used to optimize the location and sizing of FACTS devices for compensation scheme. …”
Get full text
Get full text
Thesis -
16
A De-noising Scheme for Wavelet Based Power Quality Disturbances Detection and Classification system
Published 2011“…To test the effectiveness of the de-noising scheme, the system is tested with noise-added disturbance signals generated by MATLAB programming language and some field data obtained from the PQDIF resource centre. …”
Get full text
Article -
17
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…Based on the undertaken experiment the LSI classifier is noted to generate a higher precision and recall compared to the C4.5 algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…The scripting language is designed and developed based on the algorithm structure that is defined in the proposed implementation frameworks with the dynamic parameterization. …”
Get full text
Get full text
Thesis -
19
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
20
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
