Search Results - (( technology implementation using algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- implementation using »
- java implementation »
- mining algorithm »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18µm CMOS technology: article
Published 2009“…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18µm technology and it is based on CORDIC algorithm. …”
Get full text
Get full text
Article -
9
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18um CMOS technology / Nurul Hidayah Marzuki
Published 2009“…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18um technology and it is based on CORDIC algorithm. …”
Get full text
Get full text
Thesis -
10
-
11
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Implementation of perez-dumortier calibration algorithm
Published 2014Get full text
Get full text
Get full text
Chapter In Book -
13
-
14
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…Dynamic programming is used to solve Edit Distance problem. The approach has two main sections: the methodology used in implementing, and the result. …”
Get full text
Get full text
Thesis -
15
Implementation of booth multiplier algorithm using Radix-4 in FPGA
Published 2021“…The proposed design is simulated by using Verilog HDL in Quartus II and implemented in Cyclone II FPGA. …”
Get full text
Get full text
Get full text
Article -
16
Intruder detection using histogram and edge detection algorithms
Published 2016Get full text
Get full text
Undergraduates Project Papers -
17
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
18
-
19
-
20
A hybrid algorithm for finding shortest path in network routing.
Published 2009Get full text
Article
