Search Results - (( java implementation mining algorithm ) OR ( using value based algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
5
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Enhance key generation algorithm based user string identity as public key
Published 2015“…Only odd decimal values can be used in a public key using the Tripathi algorithm. …”
Get full text
Get full text
Thesis -
9
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…In CQ Routing Algorithm, the confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm. …”
Get full text
Get full text
Thesis -
10
An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic
Published 2004“…CQ Routing Algorithm evaluates how confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm for adaptive packet routing in communication networks. …”
Get full text
Get full text
Get full text
Article -
11
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
12
Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy
Published 2014“…A new approach of CS and WDO algorithm is used for selection of optimal threshold value. …”
Get full text
Get full text
Article -
13
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
14
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
Get full text
Get full text
Get full text
Monograph -
15
Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm
Published 2019“…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
16
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…A fuzzy system is a rule-based system that uses human expert's knowledge which holds the truth or false values to make a particular decision. …”
Get full text
Get full text
Thesis -
17
STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS
Published 2019“…Though, by increasing the value of Kc can improve the response for Proportional on PV algorithm to make it as having similar response with Proportional on Error algorithm that uses the original Kc. …”
Get full text
Get full text
Final Year Project -
18
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Classifier algorithms, namely the Support Vector Machine and K-Nearest Neighbours were used for benchmarking the performance of the Real-Valued Negative Selection Algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A harmony search-based learning algorithm for epileptic seizure prediction
Published 2016“…The proposed harmony search-based learning algorithm is used in the task of epileptic seizure prediction. …”
Get full text
Get full text
Article
