Search Results - (( java implementation mining algorithm ) OR ( using program during algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- during algorithm »
- using program »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…Using the dynamic programming algorithm developed, the model was also able to recalculate alternative schedules by replacing unavailable teams with other teams to avoid delays. …”
Get full text
Get full text
Thesis -
9
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…A matheuristic approach based on a reduced two-stage Stochastic Integer Linear Programming (SILP) model is presented. The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
10
Multithreading Prioritization Concurrently by using an Effective Dynamic Slicing Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Final examination time table scheduling using integer programming with average time slot gap minimization
Published 2024“…In this research, our aim is to maximize the total amount of students’ study time to ensure that all students have sufficient time to study during exam weeks. We used an integer programming approach with an average time slot over the examination for this examination scheduling problem. …”
Get full text
Get full text
Get full text
Article -
12
Software Classification Using Structure-Based Descriptors
Published 2009“…A total of 2800 programs have been used during the training process while two different datasets of size (28) were used for testing. …”
Get full text
Get full text
Get full text
Thesis -
13
Final examination time table scheduling using integer programming with average time slot gap minimization
Published 2024“…In this research, our aim is to maximize the total amount of students’ study time to ensure that all students have sufficient time to study during exam weeks. We used an integer programming approach with an average time slot over the examination for this examination scheduling problem. …”
Get full text
Get full text
Get full text
Article -
14
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…The coding of encryption and decryption algorithms is created using C language. The coding compilation is using Borland C++ program. …”
Get full text
Get full text
Final Year Project -
15
An optimal mesh algorithm for remote protein homology detection
Published 2011“…This paper also shows that the use of the refinement algorithm increases the performance of the multiple alignments programs by at least 4%.…”
Get full text
Get full text
Article -
16
A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch
Published 2016“…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
Get full text
Get full text
Thesis -
19
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
Get full text
Get full text
Conference or Workshop Item -
20
