Search Results - (( solution constructive learning algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- solution constructive »
- constructive learning »
- implementation mining »
- java implementation »
- learning algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules
Published 2013“…The algorithm fixes the class before rule's construction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Feedforward neural network for solving particular fractional differential equations
Published 2024“…Then, a single hidden layer of FNN based on Chelyshkov polynomials with an extreme learning machine algorithm (SHLFNNCP-ELM) is constructed for solving FDEsC. …”
Get full text
Get full text
Get full text
Thesis -
10
A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing
Published 2016“…Addressing this issue, this paper proposes the adoption and enhancement of the meta-heuristic algorithm, called Teaching Learning based Optimization (TLBO), to optimize the flood evacuation routing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An Improved Ensemble Deep Learning Model Based on CNN for Malicious Website Detection
Published 2023Conference Paper -
12
A Study on Abstract Policy for Acceleration of Reinforcement Learning
Published 2014“…In this paper, the authors propose to reuse an abstract policy, a representative of a solution constructed by learning vector quantization (LVQ) algorithm, to improve initial performance of an RL learner in a similar but different problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. …”
Get full text
Get full text
Article -
15
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012“…Therefore, this paper analyzed the issues and proposed a solution to manage the audio storage.The elements from biological inspired components were studied and identified to seek for the requirements of Bio-Inspired Storing Model (BiSM).Then a structural architecture of BiSM was designed in addition the Cognitive and Constructive Learning (CCL) algorithm was proposed.Finally, BiSM and CCL algorithm were evaluated with exemplar application settings and the results were presented in a case study of MP3 music collections.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…In response to worsening urban traffic congestion, metro tunnels have emerged as a solution to ease pressure on road networks. Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. …”
Get full text
Get full text
Get full text
Thesis -
18
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…This study constructs the flow of DNN based method with the K-Means algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao
Published 2024“…The achievements of this thesis indicate a substantial step forward in the application of deep continual learning in tunnel blasting. This thesis offers a promising solution to the longstanding challenge of blast-induced overbreak. …”
Get full text
Get full text
Get full text
Thesis -
20
A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction
Published 2018“…Second, it is to construct on this method to improve an efficient process for prediction problems that can discover efficient solutions at a high speed of convergence. …”
Get full text
Get full text
Get full text
Get full text
Article
