Search Results - (( programming packaging methods algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- programming packaging »
- implementation mining »
- java implementation »
- methods algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…The new package is also verified using a commercial program. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Mould Filling In Electronic Packaging
Published 2005“…Characteristic Based Split (CBS) method is utilized in this program to analyze and model the fluid flow in a single cavity mold of the encapsulation process. …”
Get full text
Get full text
Monograph -
10
Progressive damage analysis of composite layered plates using a mesh reduction method
Published 2006“…A progressive damage methodology and algorithm for composite laminates was successfully developed for the new finite strip methods using stress-based failure criteria. …”
Get full text
Get full text
Conference or Workshop Item -
11
Path planning algorithm for a car like robot based on MILP method
Published 2013“…This has been combined with collision avoidance constraints to form a mixed integer linear program, which can be solved by a commercial software package.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Comparison Of Phylogenetic Trees Using Difference Distance Function Method
Published 2005“…The phylogenetic tree is build using the PHYLlP (the PHYlogeny Inference Package), a package of programs for inferring phylogenies (evolutionary trees). …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…In this thesis, we implement the modified ant colony programming (ACP) algorithm for solving the matrix Riccati differential equation (MRDE). …”
Get full text
Get full text
Thesis -
14
Statistical approach on grading: mixture modeling
Published 2006“…A solution to this problem is using the Markov Chain Monte Carlo method namely Gibbs sampler algorithm. The Gibbs sampler algorithm is applied using the WinBUGS programming package. …”
Get full text
Get full text
Thesis -
15
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people
Published 2004“…This is partly because traditional statistical methods and software packages allow a restricted number of variables and combinations of variables. …”
Get full text
Get full text
Get full text
Article -
16
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…Two methods of load flow solution with different accuracy are employed, i.e., simplified method, which uses the approximation of P and Q at the start of the implemented program, and fast-decoupled method, which gives an exact solution. …”
Get full text
Get full text
Thesis -
17
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…The method builds upon an approach of the open source visualization software VTK where the data visualizer program ParaView is freely available. …”
Get full text
Get full text
Thesis -
18
Progressive failure analysis of composite laminated stiffened plates using the finite strip method
Published 2009“…A progressive failure algorithm for composite laminates has been successfully developed for the new finite strip methods using a stress-based failure criterion, Tsai–Wu. …”
Get full text
Get full text
Get full text
Article -
19
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…However, legacy anti-malware methods are confronted with millions of potential malicious programs. …”
Get full text
Get full text
Get full text
Article -
20
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Both methods have its advantages and disadvantages. Both methods yields different design issues and have different engineering limitations. …”
Get full text
Thesis
