Search Results - (( java implementation mining algorithm ) OR ( using problems faced algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- faced algorithm »
- using problems »
- problems faced »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…This project will focusing on the method used to solve an optimization problem, the limitation of the method used and the results of solving flow shop sequencing problem using genetic algorithm method. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Student-supervisor matching using stable marriage algorithm / Siti Farahana Nodzari
Published 2007“…So, the problem face by students to find supervisor can be solve by using this system. …”
Get full text
Get full text
Thesis -
11
Face recognition using integrated discrete cosine transform and kernel fisher discriminant analysis
Published 2023“…Moreover, FLD is a linear algorithm by nature. Hence, it fails to extract important information from nonlinear and complex data such as face image. …”
Conference paper -
12
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
13
-
14
School teacher-subject allocation management system
Published 2024“…Not just that, Genetic Algorithm, a meta-heuristic is also used to solve the clashing problem faced by existing system using deterministic algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
-
17
Hybrid evolutionary optimization algorithms: A case study in manufacturing industry
Published 2014“…This membership function is applied for its useful performance through industrial production problems by employing hybrid evolutionary optimization algorithms. …”
Get full text
Get full text
Book -
18
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
Get full text
Get full text
Article -
19
Use of experiment design methods to determine unseen data in face recognition problems
Published 2009“…Face and non-face data will be used for training the RBF network in order for the network to discriminate face and non-face images. …”
Get full text
Get full text
Monograph -
20
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…For most face recognition algorithms, partial occlusions affect the performance of the algorithm. …”
Get full text
Get full text
Thesis
