Search Results - (( data generation process algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- generation process »
- application mining »
- process algorithm »
- java application »
- mining algorithm »
- data generation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The experiments were conducted on self generated data sets (7 different sets) and well known datasets (Mushroom & Cars Data set). …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
4
-
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…BOCEDS clusters the data stream in a single stage. The algorithm summarizes the data from data stream in micro-clusters. …”
Get full text
Get full text
Thesis -
9
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…Those processes constructed MCCTreeGenerator algorithm which will produce the same subtree as MCCTree but difference in its structure. …”
Get full text
Get full text
Thesis -
10
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis -
11
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
12
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…Problem of the size of data happen when data cannot be process because of it too complex. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Automated path testing using the negative selection algorithm
Published 2017“…Negative selection algorithm (NSA) has been used in this paper to generate test data for path testing automatically. …”
Get full text
Get full text
Indexed Article -
14
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…These devices continuously generate a massive amount of data on the network. The IoT (mobile) devices that generate these data are limited in terms of processing capacity and energy, because of these limitations of the mobile devices, they cannot process all generated tasks in the IoT application environment. …”
Get full text
Get full text
Thesis -
15
HYBRID: an efficient unifying process to mine frequent itemsets
Published 2018“…Current advancement in technology inexorably leads to data flood. More data is generated from banking, telecom, scientific experiments, etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Development of efficient t-way test data generation algorithm and execution strategies
Published 2012“…In current practice, usually the test-data are selected and executed randomly. Many useful strategies (2-Way and TWay sampling) were developed to generate test-data and facilitate smooth testing process. …”
Get full text
Get full text
Thesis -
19
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…The data was generated depends on the power of two of data. …”
Get full text
Get full text
Student Project -
20
