Search Results - (( java implementation mining algorithm ) OR ( using relation _ algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- using relation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…For optimal maintenance scheduling with low cost, high reliability, and low violation, the parameter values of the PACS algorithm were tuned using the Taguchi and Gray Relational Analysis (Taguchi-GRA) method through search-based approach. …”
Get full text
Get full text
Get full text
Article -
10
Relative motion guidance, navigation and control for autonomous spacecraft rendezvous
Published 2011“…These algorithms are used to approach, flyaround, and to depart form a target vehicle in elliptic orbits. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
12
Guidance, navigation and control for satellite proximity operations using Tschauner-Hempel equations
Published 2011“…These algorithms are used to approach, flyaround, and to depart form a target vehicle in elliptic orbits. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Guidance, navigation and control for satellite proximity operations using Tschauner-Hempel equations
Published 2014“…These algorithms are used to approach, flyaround, and to depart form a target vehicle in elliptic orbits. …”
Get full text
Get full text
Get full text
Article -
14
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
15
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
What drives Chinese youth to use fitness-related health information on social media?...
Published 2024“…Results: The analysis revealed that all three intrinsic needs—competence, autonomy, and relatedness—along with social media algorithms and source credibility, positively correlated with fitness-related health information use behaviors among youth. …”
Get full text
Get full text
Get full text
Article -
17
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…Two new decision making models have been developed in this study, the first is the combination of multi-granular linguistic information using fusion algorithm and consistent fuzzy preference relations (CFPR) and the second one is the combination of multi-granular uncertain linguistic information and consistent linguistic fuzzy preference relations (CLFPR) to cater this problem. …”
Get full text
Get full text
Thesis -
18
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…The main task of a TC is to predict the text‟s class according to the type of tag given in advance. Most TC algorithms used terms in representing the document which does not consider the relations among the terms. …”
Get full text
Get full text
Get full text
Thesis -
20
