Search Results - solution ((((calibration techniques) OR (computing techniques))) OR (mining techniques))
Search alternatives:
- calibration techniques »
- mining techniques »
-
1
Experimental analysis of camera calibration techniques used for eye tracking
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Medical Diagnosis Using Data Mining Techniques is a system in specifically facilitates the data mining techniques in predicting the appropriate drug prescription of certain condition of patients. …”
Get full text
Get full text
Thesis -
3
-
4
Review of firewall optimization techniques
Published 2018“…Minimizing firewall rules by removing anomalies in the policy proven to be one of the solutions. Firewall performance can also be optimized using data mining technique and optimization based on traffic awareness. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Applied data mining approach in ubiquitous world of air transportation
Published 2011“…This paper is going to use one of successfully used data mining techniques, namely neural network, which is capable of recognizing patterns. …”
Get full text
Get full text
Conference or Workshop Item -
6
Intrusion detection system with data mining approach: a review
Published 2011“…Despite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. …”
Get full text
Get full text
Get full text
Article -
7
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
Get full text
Get full text
Article -
8
Electromagnetic characteristic of open ended coaxial and optical fibre techniques for moisture content measurement in maize
Published 2012“…The calibration was performed using a full one-port calibration technique. …”
Get full text
Get full text
Thesis -
9
Uncovering Hidden Information Within R&D Department's Ticket Using Data Mining Clustering Approach
Published 2011“…In this study the data extracted is clustered using two different types of data mining techniques i.e. K-Means and Kohonen Network. …”
Get full text
Get full text
Get full text
Thesis -
10
A numerical method for frequent pattern mining
Published 2009“…Frequent pattern mining is one of the active research themes in data mining. …”
Get full text
Get full text
Article -
11
Left-handed metamaterial-inspired unit cell for S-Band glucose sensing application
Published 2023“…Computer software; Glucose; Medical problems; Metamaterials; Microwave sensors; Sensors; Computer simulation technology (CST); Experimental verification; Finite integration technique; Glucose concentration; Left handed metamaterial; Parametric -analysis; Sensing characteristics; Transmission coefficients; Solution mining; glucose; water; chemistry; computer simulation; genetic procedures; human; isolation and purification; microwave radiation; procedures; software; Biosensing Techniques; Computer Simulation; Glucose; Humans; Microwaves; Software; Water…”
Article -
12
Computational model of stepwise quantitative assessment of equations correctness / Nuru'l - 'Izzah Othman
Published 2015“…Hence, the underlying computational techniques of the model can be regarded as correct. …”
Get full text
Get full text
Thesis -
13
Predictive crime mapping model using association rule mining for crime analysis
Published 2014“…After training the data, the rules of relationship between attributes were generated. Here, the technique of association rule mining is being used. …”
Get full text
Get full text
Article -
14
Simulated real-time controller for tuning algorithm using modified hill climbing approach
Published 2014“…Many techniques and inventions in the field of automatic control keeps going forwards, especially that the introduction of modern computing provided a huge ground for innovation in this field. …”
Get full text
Get full text
Thesis -
15
A framework for malware identification based on behavior
Published 2012“…Malware is one of the major security threats in a computer and network environment. Modem malware embeds several techniques in order to complicate malware defence. …”
Get full text
Get full text
Thesis -
16
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Finally, future research direction to find new hybrid rule pruning techniques are provided.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Soft computing techniques, such as bio-inspired algorithms, can be used for information processing by employing methods which are capable to deal with imprecision and uncertainty. …”
Get full text
Get full text
Research Reports -
19
Automated calibration of baseline model for energy conservation using multi-objective Evolutionary Programming (EP) / Ahmad Amiruddin Mohammad Aris
Published 2019“…The baseline energy is said calibrated and can be used for retrofit analysis. In multi objectives approach, MOEP with fixed weight SWA technique is the best alternative to solve multi-objectives problem for baseline calibration with NMBE and CV(RMSE) of 3.02% and 4.64% respectively. …”
Get full text
Get full text
Thesis -
20
Modelling of interceptor drainage effect on water table and salinity levels in agricultural area of Abyek Plain Iran
Published 2016“…As a result, modelling can be a feasible technique for decision makers to design efficient drains in agricultural land faced with a high water table and salinity problem.…”
Get full text
Get full text
Thesis
