Search Results - (( java application mining algorithm ) OR ( using reflective path algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- using reflective »
- path algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
Published 2006“…In this project, we have used the Successive random algorithm (SRA). Then, we have decided to use Variance time plot and R/S statistics as our statistical analysis tools. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Comparison between Levenberg-Marquardt and scaled conjugate gradient training algorithms for ionosphere condition using Multilayer Perceptrons / Mohd Sharif Ibrahim
Published 2010“…This paper described the examinations of two training algorithms which are Levenberg-Marquardt (LM) and Scaled Conjugate Gradient (SCG) of Multilayer Perceptrons (MLPs) using MATLAB R2009a. …”
Get full text
Get full text
Thesis -
10
Suicide and self-harm prediction based on social media data using machine learning algorithms
Published 2023“…In combined with robust machine learning algorithms, social networking data may provide a potential path ahead. …”
Get full text
Get full text
Get full text
Article -
11
Optimization Method Using Modified Harmony Search For Coverage And Energy Efficiency In Wireless Sensor Network
Published 2018“…However,the sink node position and size of data transmitted will not affect the performance of coverage area.This is because the coverage area value is fluctuated as the parameters value increases.Throughout the experiment conducted,sensor nodes deployed using Modified Harmony Search algorithm (MHS) gives better coverage area compared to other existing methods.The average coverage area percentage obtained by Modified Harmony Search is 63 %.The average coverage area percentage obtained by Modified Random is 48 % and the average coverage area percentage obtained by Harmony Search is 46 %.The highest coverage area recorded for Modified Harmony Search is 70 %.To enhance the energy efficiency,shortest path distance finder is added to each method.Throughout the research,Modified Harmony Search with shortest path distance finder gives optimum results.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…In the next step, after taking the filtering steps, the Buildings Footprint was created and was saved as a vector file in the output path by keeping the first reflectance, filtering the nearest neighbor, filtering based on intensity, creating a new network, applying the height filter, filtering based on a closed range, applying the size filter, creating the initial boundary, performing noise removal at the boundary, correcting boundary fluctuations, and finally using the decision tree. …”
Get full text
Get full text
Get full text
Thesis -
13
Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment
Published 2019“…There are two issues related to ASV autonomous riverine navigation; river environment modelling and autonomous path planning and obstacles avoidance. Thus, the objectives of the research are: to develop a riverbanks identification algorithm for ASV navigation; and to develop a marine traffic rules compliant navigation and obstacles avoidance algorithm for ASV in the unstructured riverine environment. …”
Get full text
Get full text
Thesis -
14
Real-time interpolator of CNC parametric curves with chord-error and feed-rateconstraints
Published 2025“…The chord-error constraints comprise geometric and kinematic properties of different parametric curves, coveringbends and sharp turns. The resulting algorithm was executed both in real-time, online mode by driving the CNC machine directly, and in an offline mode by using a stored RS274/NGC G-code file. …”
Get full text
Get full text
Get full text
Article -
15
How social media crisis response and social interaction is helping people recover from Covid-19: an empirical investigation
Published 2022“…The assessments of the reflective measurement models based on path analysis in PLS-SEM are reliable and valid. …”
Get full text
Get full text
Article -
16
Fingerprint frontier: the evolution of biometric security
Published 2023“…Chapter two provides a detailed lens into the core mechanics, followed by an exploration of the algorithms that drive the matching processes in Chapter Three. …”
Get full text
Get full text
Get full text
Book -
17
Performance evaluation of ultrasonic assisted wire electrical discharge turning for TI-6AL-4V material
Published 2023“…The electrode wire debris generated during machining, which can resolidify to the machined surface, is able to be reduced with the integration of ultrasonic vibration to WEDT machining when using low ultrasonic amplitude (10 μm). After performing with multi-objective parameter optimization with the goal of maximising the MRR and minimising the surface roughness using genetic algorithm method, there is a 5.2% improvement for the MRR and 11.6%–27.9% improvement for surface roughness compared to conventional WEDT. …”
Get full text
Get full text
Get full text
Thesis -
18
Regional travel-time residual studies and station correction from 1-D velocity models for some stations around Peninsular Malaysia and Singapore
Published 2017“…Travel-times were calculated using three 1-D models (Preliminary Ref. Earth Model PREM (Dziewonski and Anderson, 1981, IASP91, and Lienert et al., 1986) and an adopted two-point ray tracing algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Channel Modeling and Direction-of-Arrival Estimation in Mobile Multiple-Antenna Communication Systems
Published 2005“…Our proposed channel model is able to produce fading signal waveform which agrees with the results of reflected angular power dispersions measured in the field, e.g. …”
Get full text
Get full text
Thesis -
20
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…We preprocessed the RDF graph to be stored in distributed manner after the elimination of single chain productions in order to increase the efficiency in conversion process. We used the shortest path algorithms to be called on certain resources to explore connectivity to reduce complexity of search. …”
Get full text
Get full text
Thesis
