Search Results - (( java application mining algorithm ) OR ( data deviation between algorithm ))
Search alternatives:
- application mining »
- deviation between »
- between algorithm »
- java application »
- mining algorithm »
- data deviation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article -
8
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
Get full text
Get full text
Article -
9
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Neural Network Model and Finite Element Simulation of Spring back in Plane-Strain Metallic Beam Bending
Published 2006“…The standard deviation between the finite element method and the neural network metamodels for the two functions are 0.635 degree and 0.985 mm respectively. …”
Get full text
Get full text
Thesis -
12
Ensemble divide and conquer approach to solve the rating scores’ deviation in recommendation system
Published 2016“…Therefore, this paper proposes Ensemble Divide and Conquer (EDC) approach for solving 2 main problems which are the data sparsity and the rating scores’ deviation (misplace). …”
Get full text
Get full text
Get full text
Article -
13
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. Clustering technique basically utilizes distance measure to define distance between various data points. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Three-dimension coronary artery tree curvature confirmation
Published 2010“…The standard approach was published in 1998 as a study comparing certain 3D curvature measurement algorithms. Approach: Our approach consists of three major steps: (1) Apply the paraboloid fitting technique from the standard approach; (2) Apply the 3D reconstruction algorithm proposed in this research on the same data in step (1) and (3) Apply the Standard Deviation technique on both outputs from (1) and (2) and compare the outputs. …”
Get full text
Get full text
Get full text
Article -
17
Identification of continuous-time hammerstein model using improved archimedes optimization algorithm
Published 2024“…This proposed algorithm also discerned linear and nonlinear subsystem variables within a continuous-time Hammerstein model utilizing input and output data. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values
Published 2000“…The comparison between measured and predicted capacities was conducted using standard deviation values to determine the amount of error in the prediction. …”
Get full text
Get full text
Thesis -
19
New heuristic function in ant colony system for the travelling salesman problem
Published 2012“…Experiments conducted have used eight data sets from TSPLIB with different numbers of cities.The proposed algorithm shows promising results when compared to classical ACS in term of best, average, and standard deviation of the best tour length.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…The statistical analysis showed a good agreement between the manual and automated data with a percentage difference of 1.19% to 4.82%. …”
Get full text
Get full text
Get full text
Article
