Search Results - (( java implementation mining algorithm ) OR ( using two using algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. While a rather simplistic and dated algorithm, it remains widely used and taught till this day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
5
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Enhance key generation algorithm based user string identity as public key
Published 2015“…This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. …”
Get full text
Get full text
Thesis -
9
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
Get full text
Get full text
Thesis -
10
-
11
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
12
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
13
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…We introduce two concepts of splitting messages using the scheme in El-Gamal and Massey-Omura algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
QoS routing for multiple additive QoS parameters using genetic algorithm
Published 2023Conference paper -
15
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…Dijkstra's algorithm is a classic algorithm for finding the shortest path between two points due to its optimisation capability. …”
Get full text
Get full text
Conference or Workshop Item -
16
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The use of the BOGSA algorithm aims to create a new equation for the calculation of the masses of population individuals, as found in the theoretical work in the Strength Pareto Evolutionary Algorithm two (SPEAII) algorithm. …”
Get full text
Get full text
Thesis -
17
AntNet: a robust routing algorithm for data networks
Published 2004“…This paper compares the performance of AntNet2.0 against two other commercially popular algorithms, viz. link state routing algorithm and distant vector routing algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Extensions to the K-AMH algorithm for numerical clustering
Published 2018“…The experimental results prove that the k-AMH Numeric I and k-AMH Numeric II algorithms can be effectively used for numerical clustering. …”
Get full text
Get full text
Get full text
Article -
19
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…The proposed 2D path planning algorithms, on the contrary, select a relatively smaller number of vertices using the so-called base line (BL), thus they are computationally efficient. …”
Get full text
Get full text
Thesis -
20
