Search Results - (( java implementation mining algorithm ) OR ( programmers data selection algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- selection algorithm »
- mining algorithm »
- programmers data »
- data selection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…The right determination of an undergraduate programme selection by applicants is not an easy task. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
10
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This best algorithm consists of greedy prefetching and prefetch array algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
12
Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data
Published 2023Conference Paper -
13
Logic modeling and mathematical model in developing a tree species selection prototype
Published 2014“…The algorithms related to the analysis of the systems prototype were also presented in this article. …”
Get full text
Get full text
Get full text
Article -
14
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…In this thesis, local sensing results are produced by SUs or vehicles by selecting the best spectrum sensing technique. The selection would be made based on the hybrid machine learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
A machine learning approach of predicting high potential archers by means of physical fitness indicators
Published 2019“…These findings could be valuable to coaches and sports managers to recognise high potential archers from a combination of the selected few physical fitness performance indicators identified which would subsequently save cost, time and energy for a talent identification programme.…”
Get full text
Get full text
Article -
16
A machine learning approach of predicting high potential archers by means of physical fitness indicators
Published 2019“…These findings could be valuable to coaches and sports managers to recognise high potential archers from a combination of the selected few physical fitness performance indicators identified which would subsequently save cost, time and energy for a talent identification programme.…”
Get full text
Get full text
Get full text
Article -
17
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The selected control number is picked with a higher efficiency before the rescheduling is approximately 80 % for optimized controllers up to 90 % of resource management than other comparable algorithms in such a densified network. …”
Get full text
Get full text
Thesis -
18
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…All the hype surrounding the SDNs is predominantly because of its centralized management functionality, the separation of the control plane from the data forwarding plane, and enabling innovation through network programmability. …”
Get full text
Get full text
Thesis -
19
STUDY OF THE MICRO UNMANNED AERIAL VEHICLE (MUAV) VERTICAL TAKE-OFF AND LANDING (VTOL) CONTROL SYSTEM
Published 2011“…Besides, the self-programmable Microchip picl8f4431 processor also has been selected which the control system coding can be embedded. …”
Get full text
Get full text
Final Year Project -
20
Artificial Intelligence (AI) to predict dental student academic performance based on pre university results
Published 2021“…Dataset output variables include the number of repeat papers, repeat years, distinctions, and graduation on time. Exploratory Data Analysis will be performed with training and testing data. …”
Get full text
Get full text
Proceeding Paper
