Search Results - (( java implementation mining algorithm ) OR ( programming validity force algorithm ))
Search alternatives:
- implementation mining »
- programming validity »
- java implementation »
- mining algorithm »
- force algorithm »
- validity force »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Modeling and optimization of cold extrusion process by using response surface methodology and metaheuristic approaches
Published 2018“…Subsequently, the analytical approach and metaheuristic algorithms, specifically the particle swarm optimization, cuckoo search algorithm (CSA) and flower pollination algorithm, were applied to optimize the extrusion process parameters. …”
Get full text
Get full text
Article -
9
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis -
10
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…It involves the development of new programs and modifications of an existing simulation program. …”
Get full text
Get full text
Thesis -
11
Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization
Published 2015“…Software testing relates to the process of accessing the functionality of a program. To ensure conformance, test engineers often generate a set of test cases to validate against the user requirements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad
Published 2022“…Overall, deep learning using the Tensorflow.Keras (tf.keras) application programming interface (API) makes the development of the DCNN model easier. …”
Get full text
Get full text
Thesis -
13
AI technology factors mediated via intention to use in UAE petroleum companies case study
Published 2024“…Artificial Intelligence (AI) represents a transformative force globally, with its computational prowess, data accessibility, and revolutionary algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…The multilayer shell and beam elements are available in the element library of this finite element program.Both above finite element codes are equipped with pre, post processing and animation graphic facilities. …”
Get full text
Get full text
Thesis
