Search Results - (( wave visualization based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- visualization based »
- wave visualization »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…A simple rendering algorithm, i.e. sine wave, produces a more stable force feedback, yet lacks surface details compared to the visual texture information approach.…”
Get full text
Get full text
Thesis -
5
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
Get full text
Get full text
Thesis -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The monitoring and visualization of tumor cells growth are based on the large scale mathematical simulation. …”
Get full text
Get full text
Get full text
Get full text
Book -
10
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
-
14
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials
Published 2013“…Ultrasonic testing has been a promising NDT which is based on the detection and the interpretation of the ultrasonic waves reflected by defects. …”
Get full text
Get full text
Thesis -
16
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Article -
17
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The system has integrated GIS, RS, DEM, data management capability and a dynamic basin model within a common Windows environment. The simulation algorithms of the rainfall-runoff model have operated on grid bases compatible with the MATLAB programming language, which has been used to write instructions to many grid-based operations. …”
Get full text
Get full text
Thesis -
18
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…It can also be used to read, encrypt and write a wave file. The entire system is implemented, tested and validated using MATLAB and Visual C++. …”
Get full text
Get full text
Final Year Project
