Search Results - (( some equalization based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- some equalization »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Indoor global path planning based on critical cells using dijkstra algorithm
Published 2015“…The algorithm uses floor plan of any environment discretized to some equal-sized square grids. …”
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Development of committee machine models for multiple response optimization problems
Published 2014“…The results represent Global Desirability of proposed algorithm is equal or higher than GD of case studies. …”
Get full text
Get full text
Thesis -
10
Power system stabilization based on artificial intelligent techniques: a review
Published 2009“…Research showed controllers designed based on a conventional control theory, modern and adaptive control theories, suffer from some limitations. …”
Get full text
Conference or Workshop Item -
11
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
12
A COMPUTATIONAL ALGORITHM for the NUMERICAL SOLUTION of NONLINEAR FRACTIONAL INTEGRAL EQUATIONS
Published 2022“…With the help of the mentioned technique, the considered problem is transformed to a system of algebraic equations which is then solved for the required results by using Broyden algorithm. To check the validation and convergence of the proposed technique, some examples are given. …”
Get full text
Get full text
Article -
13
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
14
-
15
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
Get full text
Thesis -
16
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
17
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis -
18
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
19
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…Out of six data sets, the &-AMH algorithm obtained the highest mean accuracy scores for the five data sets and one data set was at equal performance. …”
Get full text
Get full text
Thesis -
20
Weblog search engine based on quality criteria
Published 2011Get full text
Get full text
Get full text
Article
