Search Results - (( java implementation mining algorithm ) OR ( using analytical modified algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- analytical modified »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Modified Sumudu Transform Analytical Approximate Methods For Solving Boundary Value Problems
Published 2019“…In this algorithm, the convolution theorem has been used to find an optimal Lagrange multiplier.…”
Get full text
Get full text
Thesis -
9
Modified Sumudu Transform Analytical Approximate Methods For Solving Boundary Value Problems
Published 2019“…In this algorithm, the convolution theorem has been used to find an optimal Lagrange multiplier.…”
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017Get full text
Get full text
Get full text
Book Chapter -
14
Solving nonlinear equation using Bisection method and its variants based on MATLAB GUI / Muhammad Athir Zamani
Published 2023“…In this research, five different variants of Bisection which are Bisection, Modified Bisection Algorithm, Trisection, Regula Falsi and fzero were used to approximate the root of 15 different functions. …”
Get full text
Get full text
Thesis -
15
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The new proposed method (MBPSO+MKN+GK) Gustafson- Kessel algorithm (GK)integrated with modified of Kohonen Network algorithm (MKN)and modified binary particle swarm optimization (MBPSO) was used to classify the credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
Analytical approach to unidirectional flow of non-Newtonian fluids of differential type
Published 2015“…Both of these two problems are solved using a new modified homotopy perturbation transform method. …”
Get full text
Get full text
Get full text
Thesis -
19
Use of new efficient lossless data compression method in transmitting encrypted Baptista symmetric chaotic cryptosystem data
Published 2016“…A new compression algorithm used to ensure a modified Baptista symmetric cryptosystem which is based on a chaotic dynamical system to be applicable is proposed. …”
Get full text
Get full text
Article -
20
