Search Results - (( java implementation mining algorithm ) OR ( using site using algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- using algorithm »
- using site »
- site using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…Thus, the first phase is to develop a criteria scheme data for potential Renewable Energy Sources (RES) sites. It is followed by identifying RES sites using spatial data and Multi-Criteria Decision Making-Analytical Hierarchy Process (MCDM-AHP) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Performance analyses of various photovoltaic power plant based on local spectral irradiances in Malaysia using genetic algorithm
Published 2023“…This project aims to measure the performances of various photovoltaic power plants in Malaysia based on local spectral irradiances using genetic algorithm. A Python computational model that uses genetic algorithms will be developed to estimate the optimal tilt angle and orientation angle as well as the solar power received for the solar sites. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…A landfill site is an area of land that is used to dump rubbish, either directly on the ground or by filling a hole in the ground. …”
Get full text
Get full text
Thesis -
11
Enhance luhn algorithm for validation of credit cards numbers.
Published 2013“…The enhancement is expected to be useful for many e-commerce sites that use the algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
Using Economic Model To Improve The Performance Of BHR Dynamic Replication Algorithm.
Published 2007Get full text
Get full text
Conference or Workshop Item -
15
-
16
Mobile agent routing for query retrieval using genetic algorithm
Published 2004“…Mobile agents often have a task to collect data from several predefined sites.This should be done in an efficient way by minimizing the elapsed time.Usually these agents only know the list of sites but not the distances between them.This paper proposes a method to minimize a network routing time taken by the mobile agents to collect information from different sites using genetic algorithm (GA).The mobile agents repeat travelling over short routes and avoid longer ones.Mobile agents for query retrieval have used the GA to select the best routes that minimize the query retrieval time.The result shows that the proposed method provides good time minimization in retrieving the query results by the mobile agents based on different GA parameters.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Implementation of Graph Based Path Planning Algorithms on a Mobile Robot in a Confined Site
Published 2017Get full text
Get full text
Final Year Project -
18
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The use of three to five transactions is in NRG the data will be replicated into three to five sites. …”
Get full text
Get full text
Thesis -
19
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
Get full text
Get full text
Thesis -
20
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
Get full text
Get full text
Article
