Search Results - (( java application mining algorithm ) OR ( data deviation _ algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- data deviation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…It windows the data, calculates the standard deviation of the data in the windows and then averages the standard deviations. …”
Get full text
Get full text
Get full text
Article -
8
A Standard Deviation Selection in Evolutionary Algorithm for Grouper Fish Feed Formulation
Published 2016“…Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable. …”
Get full text
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
A standard deviation selection in evolutionary algorithm for grouper fish feed formulation
Published 2016“…Malaysia is one of the major producer countries for fishery production due to its location in the equatorial environment.Grouper fish is one of the potential markets in contributing to the income of the country due to its desirable taste, high demand and high price.However, the demand of grouper fish is still insufficient from the wild catch.Therefore, there is a need to farm grouper fish to cater to the market demand.In order to farm grouper fish, there is a need to have prior knowledge of the proper nutrients needed because there is no exact data available.Therefore, in this study, primary data and secondary data are collected even though there is a limitation of related papers and 30 samples are investigated by using standard deviation selection in Evolutionary algorithm.Thus, this study would unlock frontiers for an extensive research in respect of grouper fish feed formulation.Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable.The feasible and low fitness, quick solution can be obtained. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…For the automatic control of an artificial hand and to feedback information to the amputee, an algorithm has been developed based on the standard deviation (SD) of signal data from the sensor. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
13
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…The rapid increase in the amount of textual data has brought forward a growing research interest towards mining text to detect deviations. …”
Get full text
Get full text
Get full text
Article -
14
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
Get full text
Get full text
Article -
15
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
Get full text
Get full text
Article -
16
MUD-WEIGHT PREDICTION FOR DEVIATED DRILLING
Published 2013“…This project aims to provide an in-house application to predict the mud weight design in deviated drilling. Specifically, the objectives of this project are 1) to develop an algorithm for predicting mud weight in deviated drilling; 2) to solve the governing equation for stresses around the wellbore for deviated drilling and 3) to build an integrated tool kit for different data that are available on the field. …”
Get full text
Get full text
Final Year Project -
17
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article -
18
-
19
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The system detected and diagnosed process deviations using the saved data and the set limit. Fault occurred if the data value was out of limits. …”
Get full text
Get full text
Thesis -
20
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…In this paper, a robust Hill algorithm (Hill++) is proposed. The algorithm is an extension of the Affine Hill cipher. …”
Get full text
Get full text
Article
