Search Results - (( same location based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- same location »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Article -
8
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
New Algorithm of Location Model based on Robust Estimators and Smoothing Approach
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Optimization of image mapping & camera coverage efficiency for continuous location and tracking
Published 2023“…The Vision Based location and tracking is a vastly escalating technology mainly used to monitor various environments. …”
Conference paper -
12
Design of wavelet neural networks based on symmetry fuzzy C-means for function approximation
Published 2013“…In this paper, an enhanced fuzzy C-means algorithm, specifically the modified point symmetry–based fuzzy C-means algorithm (MPSDFCM), was proposed, in order to determine the optimal initial locations for the translation vectors. …”
Get full text
Get full text
Get full text
Article -
13
Wifi fingerprinting indoor positioning with multiple access points in a single base station using probabilistic method
Published 2017“…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
Get full text
Get full text
Article -
14
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
Get full text
Get full text
Get full text
Article -
15
Balancing exploration and exploitation in ACS algorithms for data clustering
Published 2019“…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. …”
Get full text
Get full text
Get full text
Article -
16
Privacy-aware personal navigation services / Melissa Shahrom
Published 2013“…Therefore, protecting the confidentiality of location privacy is extremely vital. This innovation produces an algorithm that is able to protect location privacy and at the same time generate robust navigation instructions without depending on precise location information. …”
Get full text
Get full text
Book Section -
17
WIFI FINGERPRINTING INDOOR POSITIONING WITH MULTIPLE ACCESS-POINTS IN A SINGLE BASE STATION USING PROBABILISTIC METHOD
Published 2017“…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
Get full text
Get full text
Thesis -
18
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
19
Replica Creation Algorithm for Data Grids
Published 2012“…This research contributes replication strategies embodied in one algorithm that enhances data grid performance, capable of making a decision on creating or deleting more than one file during same decision. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Solving vehicle routing problem by using improved K-nearest neighbor algorithm for best solution
Published 2017“…Approach: The approach has been presented based on two phases: firstly, the algorithms have been adapted to solve the research problem, where its procedure is different than the common algorithm. …”
Get full text
Get full text
Get full text
Article
