Search Results - (( java application mining algorithm ) OR ( using ((function a) OR (function _)) algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- function a »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
5
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
6
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…Function as a Service (FaaS) is becoming a popular method to process such IoT workloads. …”
Get full text
Get full text
Get full text
Article -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
13
Effect of fitness function on localization performance in range-free localization algorithm
Published 2024“…How to choose the best localization fitness function for a specific target is a key factor in determining whether the localization algorithm is accurate or not. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A video-rate color image segmentation using adaptive and statistical membership function
Published 2010“…In this algorithm, statistical information of regions is used to create fuzzy membership functions in color model components. …”
Get full text
Get full text
Get full text
Article -
15
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
Get full text
Get full text
Article -
16
Common benchmark functions for metaheuristic evaluation: a review
Published 2017“…In literature, benchmark test functions have been used for evaluating performance of metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Article -
17
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing harmony search parameters based on step and linear function for bus driver scheduling and rostering problems
Published 2018“…This is achieved by using a first type of association between the linear increase function with a second model of the dynamic increase of step function being remarkable in other combinations and also other models.In conclusion,this proposed approach managed to generate a fairer roster and was thus capable of maximising the balancing distribution of shifts and routes among drivers,which contributed to the lowering of illness, incidents,absenteeism and accidents.…”
Get full text
Get full text
Get full text
Thesis -
20
Transform of Artificial Immune System algorithm optimization based on mathematical test function
Published 2023Conference Paper
