Search Results - (( java application mining algorithm ) OR ( data integration index algorithm ))
Search alternatives:
- application mining »
- integration index »
- java application »
- mining algorithm »
- data integration »
- index algorithm »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
Optimized PV-Battery Systems using Backtracking Search Algorithm for Sustainable Energy Solutions
Published 2024Conference Paper -
11
-
12
-
13
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010Get full text
Get full text
Get full text
Citation Index Journal -
14
Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan
Published 2017“…The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
Get full text
Get full text
Thesis -
15
-
16
A Systematic Review Of Machine Learning Algorithms For Mental Health Detection Using Social Media Data
Published 2026journal::journal article -
17
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
18
Finger exoskeleton for early acute stroke rehabilitation: control design and performance analysis / Muhammad Naim Abdu Salam
Published 2020“…The second objective was to assess the performance of position control for index finger in rehabilitation. The control algorithm utilized was PID control algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis
