Search Results - (( java application mining algorithm ) OR ( rules active learning algorithm ))
Search alternatives:
- application mining »
- learning algorithm »
- java application »
- mining algorithm »
- active learning »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules
Published 2013“…In the first proposed algorithm, SA is used to optimize the rule's discovery activity by an ant. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
An ELM-based single input rule module and its application in power generation
Published 2023“…Extreme Learning Machine (ELM) is widely known as an effective learning algorithm than the conventional learning methods from the point of learning speed as well as generalization. …”
Article -
9
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article -
10
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…This enables machine learning model to detect those suspicious activities more accurately than traditional approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction
Published 2013“…The proposed AI adopted is an artificial neural network (ANN) responsible to detect current harmonics for the active power filtering process. The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
Get full text
Get full text
Conference or Workshop Item -
14
Unified neural network controller of series active power filter for power quality problems mitigation
Published 2013“…First, Widrow-Hoff algorithm is examined and its constant learning rate is modified by adding an adaptive learning rule to change the learning rate value. …”
Get full text
Get full text
Thesis -
15
E-Handrawn Calculator
Published 2008“…Back-propagation network is a supervised learning method, and is an implementation of the Delta rule. …”
Get full text
Get full text
Final Year Project -
16
PROPOSED METHODOLOGY FOR OPTIMIZING THE TRAINING PARAMETERS OF A MULTILAYER FEED-FORWARD ARTIFICIAL NEURAL NETWORKS USING A GENETIC ALGORITHM
Published 2011“…Particularly, GA is utilized to determine the optimal number of hidden layers, number of neurons in each hidden layer, type of training algorithm, type of activation function of hidden and output neurons, initial weight, learning rate, momentum term, and epoch size of a multilayer feed-forward ANN. …”
Get full text
Get full text
Thesis -
17
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
18
Adaptive unified neural network for dynamic power quality compensation
Published 2013“…Moreover, an adaptive learning rule is applied on the neural network algorithm to enhance the system speed in detecting voltage sag magnitude and phase. …”
Get full text
Get full text
Conference or Workshop Item -
19
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
Get full text
Get full text
Get full text
Article -
20
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…A number of researchers keep on proposing various alternative framework consisting detection methods day by days in combating activities such as single classification and rule based approach. …”
Get full text
Get full text
Get full text
Technical Report
