Search Results - (( given equalization based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- equalization »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Modified HOS based Eigenvector algorithm for improvement of poor SNR of Seismic data
Published 2007“…Convolutional noise makes it difficult to identify the closely spaced bedding. Proposed blind equalization technique is based on the eigenvector algorithm [17], certain modifications are incorporated to reduce the MMSE, max. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A new split based searching for exact pattern matching for natural texts
Published 2018Get full text
Get full text
Article -
10
Exp-bet packet scheduling algorithm for multiple traffic services in long term evolution (LTE) system / Ku Siti Syahidah Ku Mohd Noh
Published 2016“…In this thesis, the comparison of proposed algorithm namely the Exponential Blind Equal Throughput (EXP-BET) was made with the Exponential Proportional Fairness (EXP-PF) and Frame Level Scheduler (FLS) algorithms. …”
Get full text
Get full text
Thesis -
11
Bat algorithm for rough set attribute reduction
Published 2023“…In this paper, a new optimization method has been introduced called bat algorithm for attribute reduction (BAAR), the proposed method is based mainly on the echolocation behavior of bats. …”
Article -
12
Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
Published 2020“…In this algorithm, the Boolean function given with coefficients, n is equal to ten (10) and its degree, d is equal to six (6). …”
Get full text
Get full text
Get full text
Article -
13
A COMPUTATIONAL ALGORITHM for the NUMERICAL SOLUTION of NONLINEAR FRACTIONAL INTEGRAL EQUATIONS
Published 2022“…With the help of the mentioned technique, the considered problem is transformed to a system of algebraic equations which is then solved for the required results by using Broyden algorithm. To check the validation and convergence of the proposed technique, some examples are given. …”
Get full text
Get full text
Article -
14
-
15
An Algorithm for Automatically Updating a Forsyth-Edwards Notation String without an Array Board Representation
Published 2023Conference Paper -
16
Cost effective Expa-Max-Min scientific workflow allocation and load balancing strategy in cloud computing
Published 2018“…Scheduling multiple workflows with the standard Max-Min algorithm is a challenge because of the high priority given to task with maximum execution time first. …”
Get full text
Get full text
Get full text
Article -
17
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
18
Face recognition based automated student attendance system
Published 2018“…The facial images are then classified and recognized based on the best result obtained from the combination of algorithm, enhanced LBP and PCA. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
Get full text
Thesis -
20
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…Entropy and frequency-based CAN IDS were found to be relatively better at detecting attacks, particularly fabrication attacks; while other algorithms did not perform well, as indicated by low MCC scores.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
