Search Results - (( simulation optimization add algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- optimization add »
- mining algorithm »
- add algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…The objectives of the hybrid technique are to improve the security and add noise from the optimization algorithm and generate chaotic secret key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Integration Of Travel Time Zone For Optimal Siting Of Emergency Facilities
Published 2008“…Fire stations in Jakarta Selatan were chosen for simulation. Two algorithms, Greedy Adding (Add) and Greedy Adding with Travel Time Evaluation (GAT), were applied to solve the optimization problem of the MSAP. …”
Get full text
Get full text
Thesis -
10
Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card
Published 2016“…This packet clustering optimization is an expansion of our previous base network card optimization in cloud network environment, using genetic algorithm. …”
Get full text
Get full text
Article -
11
A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains
Published 2023Article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…There is also Reed-Solomon code with the MDS property used in the key schedule; this doesn't add diffusion to the cipher but does add diffusion to the key schedule.) …”
Get full text
Get full text
Final Year Project -
14
Optimized electric power distribution via genetic algorithm based estimation / Otonye Ene Ojuka ... [et al.]
Published 2024“…This research shows an effective way of minimizing power loss in distribution lines using optimal capacitor placement (OCP) in conjunction with a genetic algorithm (GA). …”
Get full text
Get full text
Article -
15
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…There is also Reed-Solomon code with the MDS property used in the key schedule; this doesn't add diffusion to the cipher but does add diffusion to the key schedule.) …”
Get full text
Conference or Workshop Item -
16
Facility location models development to maximize total service area
Published 2009“…This paper present and discuss the new developed model to maximize total service area of a fixed number of facilities. Two greedy algorithms, Greedy Adding (ADD) and Greedy Adding with Substitution (GAS), were applied to solve the optimization problem of the Maximal Service Area Problem (MSAP). …”
Get full text
Get full text
Get full text
Article -
17
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
Get full text
Get full text
Thesis -
18
On the spectra efficiency of low-complexity and resolution hybrid precoding and combining transceivers for mmWave MIMO systems
Published 2019“…In addition, simulation results also reveal that the achievable rate of the proposed LrHPC algorithm is higher than those of the existing algorithms under consideration.…”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
New synchronization protocol for distributed system with TCP extension
Published 2013“…The new protocol is simulated with using the OPNET and the MATLAB software. …”
Get full text
Get full text
Thesis
