Search Results - (( java implementation mining algorithm ) OR ( programming computing force algorithm ))
Search alternatives:
- implementation mining »
- programming computing »
- java implementation »
- mining algorithm »
- computing force »
- force algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…The process involves a lot of computational work and mistakes are easily made. There is also possibility that the design does not meet specification thus forcing the process to be repeated. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
A hybrid intelligent active force controller for robot arms using evolutionary neural networks
Published 2000“…The EC part of the algorithm composes of a hybrid genetic algorithm (GA) and an evolutionary program (EP). …”
Get full text
Get full text
Article -
10
-
11
Hybrid intelligent active force controller for robot arms using evolutionary neural networks
Published 2000“…The EC part of the algorithm composes of a hybrid genetic algorithm (GA) and an evolutionary program (EP). …”
Get full text
Get full text
Article -
12
Development of a software for simulating active force control schemes of a two-link planar manipulator
Published 2005“…The Paper Describes The Development Of A Software In The Form Of An Interactive Computer Program That Integrates A Number Of Robotic Control Schemes With The Active Force Control (Afc) Strategy As The Key Element Of The Robotic System That Assumes A Rigid Two-Link Planar Configuration. …”
Get full text
Get full text
Get full text
Article -
13
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
14
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…There are a number of costumers like corporate components, social media programs and individual customers are all moving towards to the vast area of cloud computing. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Development of a software for simulating active force control schemes of a two–link planar manipulator
Published 2005“…The paper describes the development of a software in the form of an interactive computer program that integrates a number of robotic control schemes with the active force control (AFC) strategy as the key element of the robotic system that assumes a rigid two–link planar configuration. …”
Get full text
Get full text
Get full text
Article -
16
Development of finite element model for soil-structure interaction
Published 2014“…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
Get full text
Get full text
Thesis -
17
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
18
-
19
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…It involves the development of new programs and modifications of an existing simulation program. …”
Get full text
Get full text
Thesis -
20
