Search Results - (( wave (equalization OR visualization) based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- wave »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
A WAVELET BASED SIGNAL DENOISING AND HYDROCARBON PREDICTION ALGORITHM FOR A NEW MARINE CSEM ANTENNA DESIGN
Published 2017“…This antenna lacks in directivity and focusing of the EM waves. The HED also propagates the EM waves equally in all directions which is a major problem in shallow water with air waves. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…A simple rendering algorithm, i.e. sine wave, produces a more stable force feedback, yet lacks surface details compared to the visual texture information approach.…”
Get full text
Get full text
Thesis -
6
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…The test was conducted using three stimulus repetition rates ( 81.1, 66.1, and 33.3 cps), and the signal averaging was stopped based on ; (i) F test at multiple points equal to 3.1(ii) visual detection (iii) fixed signal average at 2500 sweeps. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
Assessment of cognitive load using multimedia learning and resting states with deep learning perspective
Published 2019“…It is a well-understood fact that the brain activity increases with the increased demand of cognition. The deep learning algorithm based on Pre-trained convolutional neural network (CNN) networks have been used as a transfer learning for the classification of rest and cognitive states and also assessed the cognitive load using brain waves particularly alpha wave. …”
Get full text
Get full text
Conference or Workshop Item -
12
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The monitoring and visualization of tumor cells growth are based on the large scale mathematical simulation. …”
Get full text
Get full text
Get full text
Get full text
Book -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Integral-derivative (I-D) and modulation-index-curve prediction control techniques for three-phase AC-DC buck-type converter with simplified voltage-based SPWM /Azrita Alias
Published 2015“…The algorithm of the modulation-index-curve prediction technique is obtained through I-D control model by determining closed-loop dominant poles. …”
Get full text
Get full text
Thesis -
20
Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials
Published 2013“…Ultrasonic testing has been a promising NDT which is based on the detection and the interpretation of the ultrasonic waves reflected by defects. …”
Get full text
Get full text
Thesis
