Search Results - (( java implementation mining algorithm ) OR ( programming program anti algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- programming program »
- mining algorithm »
- anti algorithm »
- program anti »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman
Published 2024“…Finite Element (FE) programming is an alternative, but it requires strong theoretical and mathematical knowledge, along with programming skills. …”
Get full text
Get full text
Thesis -
9
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…Researchers from the Satellite Navigation Research Group (SNAG) of UTM are currently conducting a research program that mitigates the effect of the Anti-Spoofing (AS) policy. …”
Get full text
Get full text
Article -
10
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…Many antimalware software packages and tools have been developed to protect legitimate users from these threats. However, legacy anti-malware methods are confronted with millions of potential malicious programs. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Monitoring and Control of Pressure in a Gas Plant via PID plus Feedforward Controller
Published 2009“…To execute the overall simulation, the controller is built on MATLAB/Simulink/LabVIEW which is a technical computing program that has easily adaptable structure where control strategies and model variables can be modified. …”
Get full text
Get full text
Final Year Project -
14
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
15
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Prediction of novel doping agent using an in silico model that integrates chemical, biological and phenotypic data
Published 2016“…Mitragynine which is listed in WADA Monitoring Program, has also the potential as novel doping agent due to its binding activity on x-opioid receptors. …”
Get full text
Get full text
Student Project -
17
Prioritizing CD4 count monitoring in response to ART in resource-constrained settings: a retrospective application of prediction-based classification
Published 2012“…Background: Global programs of anti-HIV treatment depend on sustained laboratory capacity to assess treatment initiation thresholds and treatment response over time. …”
Get full text
Get full text
Get full text
Article -
18
Design and manufacturing of a new CNC gantry machine with double motion feed drive system / Seyed Reza Besharati
Published 2015“…Today, the CNC gantry machines are widely used in manufacturing combined with software programs to efficiently and consistently create different products for large companies or even single consumers. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
