Search Results - (( data alleviation based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- alleviation based »
- data alleviation »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
-
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…Many fields such as data science, data mining suffered from the rapid growth of data volume and high data dimensionality. …”
Get full text
Get full text
Article -
10
An enhanced feed-forward neural networks and a rule-based algorithm for predictive modelling of students' academic performance
Published 2016“…Also, for a more efficient exploration of students‟ data collected for this research, a Rule-Based Algorithm is proposed and implemented. …”
Get full text
Get full text
Thesis -
11
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…As observed, the computational time of RSA algorithm combined with DNA coding was longer. In order to alleviate this problem, data redundancy was reduced by activating the GZIP compressed algorithm. …”
Article -
12
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
Get full text
Get full text
Thesis -
13
Landslide susceptibility mapping: machine and ensemble learning based on remote sensing big data
Published 2020“…Next, an ensemble model consisting of all four algorithms is implemented to examine possible performance improvements. …”
Get full text
Get full text
Get full text
Article -
14
Data-driven PID controller of wind turbine systems using safe experimentation dynamics algorithm
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes
Published 2019“…Next, the problem of large variations in energy consumptions with multiple sinks in merging tree-based multiple energy hole alleviation algorithm (MEHA-MT) is addressed. …”
Get full text
Get full text
Thesis -
16
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…The existing cache replacement (i.e. least recently used (LRU)) algorithm depends on usage of the data being referenced. …”
Get full text
Get full text
Thesis -
17
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…The paper presents a well-organized trust estimation-based routing scheme (ETERS) that consists multi-trust (communication trust, energy trust, data trust) approach to alleviate several internal attacks like badmouthing, Sybil, selective forwarding, onâ��off,â�� black hole, and gray-hole attacks for clustered WSN. …”
Get full text
Get full text
Article -
18
Development of hierarchical analytical scheduling (HAS) - a conceptual framework.
Published 2012“…The model works by determining the relative importance of data during cache replacement policy. HAS is based on the concept of hierarchical temporal memory (HTM), in which the scheduling is derived on the priority and similarity of data from the aspect of space and time. …”
Get full text
Conference or Workshop Item -
19
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…The frequency domain method of analysis that involves Gardner transformation and conventional inverse filtering often degrades the quality of deconvolved data, leading to inaccurate results, especially for noisy data. …”
Get full text
Get full text
Get full text
Article -
20
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
Get full text
Get full text
Get full text
Thesis
