Search Results - (( chain integration method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- integration method »
- application mining »
- chain integration »
- method algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi
Published 2018“…A Modified Particle Swarm Optimization (MPSO) algorithm, a Genetic Algorithm (GA), a modified fruit fly optimization algorithm (MFOA) and a simulated annealing (SA) algorithm were used to find the optimal solution. …”
Get full text
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Integrated supply chain planning under uncertainty using an improved stochastic approach
Published 2011“…This paper proposes an integrated model and a modified solution method for solving supply chain network design problems under uncertainty. …”
Get full text
Get full text
Get full text
Article -
10
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
Get full text
Get full text
Thesis -
11
Development of a two-level trade credit model with shortage for deteriorating products using hybrid metaheuristic algorithm
Published 2015“…A hybrid metaheuristic algorithm which combines Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) algorithm, is then developed to solve the established models. …”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
A review and comparative analysis of predictive models for supply chain demand forecasting
Published 2026“…This paper presents a comparative analysis of traditional forecasting models and machine learning approaches for supply chain demand prediction. This study reviews key techniques, including statistical time-series models, supervised and unsupervised learning algorithms, ensemble methods, and deep learning architectures. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Carbon dioxide management for product supply chain and total site utilisation and storage
Published 2018“…This research proposes a methodology for CO2 emission reduction throughout product supply chain and end-of-pipe management of CO2 via total site integration. …”
Get full text
Get full text
Thesis -
15
Development of cost reduction mathematical model for natural gas transmission network system
Published 2012“…In addition, a multi-echelon supply chain was designed for NGTSs named Natural Gas Transmission Network Supply Chain (NGTSC). …”
Get full text
Get full text
Thesis -
16
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
Published 2017“…They result to even shorter chains of operations than ones returned by many metaheuristic algorithms for the AC.…”
Get full text
Get full text
Get full text
Article -
17
Second law considerations in fourier heat conduction of a lattice chain in relation to intermolecular potentials
Published 2016“…For these harmonic potentials, it appears from the simulation results that steady state solutions exist utilizing non-synthetic thermostats that couple not just the two particles at the extreme ends of the lattice chain, but to a control volume of N particles located at either ends of the chain that does not accord with the unique analytical solutions that obtains for single particle thermostatting at the ends of the lattice with a di�erent thermostatting algorithm that utilizes coupling coe�cients. …”
Get full text
Get full text
Conference or Workshop Item -
18
The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain
Published 2024“…Based on organizational learning theory and dynamic capability perspective, this study constructs a theoretical framework of dual integration of technological innovation (exploratory innovation and pioneering innovation) and dynamic capability, and explores its impact mechanism on the global value chain upgrading of Chinese construction machinery enterprises. …”
Get full text
Get full text
Get full text
Article -
19
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
20
A bayesian via laplace approximation on log-gamma model with censored data
Published 2016“…Problem/Objective: In this paper we introduce a solution to closed forms of its survival function of the model which shows the suitability and flexibility towards modelling real life data. Methods/Analysis: Alternatively, Bayesian estimation by MCMC simulation using the Random-walk Metropolis algorithm was applied, using AIC and BIC comparison makes it the smallest and great choice for fitting the survival models and simulations by Markov Chain Monte Carlo Methods. …”
Get full text
Get full text
Article
