Search Results - (( _ application method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- method algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
3
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
6
-
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method is methods that follow the natural concept. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
Get full text
Get full text
Get full text
Thesis -
10
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article -
11
Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation
Published 2011“…Various images from different application domains, including synthetic and real-world images, have been used in this thesis to show the applicability of the proposed algorithms. …”
Get full text
Get full text
Thesis -
12
A comparison of double-end partial discharge localization algorithms in power cables
Published 2023“…The algorithm, however, is only applicable to multi-end PD measurement methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
Get full text
Get full text
Article -
14
-
15
Evaluation of dynamic programming among the existing stereo matching algorithms
Published 2015“…This can propose the dynamic programming method to be used on many applications in image processing.…”
Get full text
Get full text
Get full text
Article -
16
-
17
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
18
Renovation explicit dynamic procedures by application of Trujillo algorithm
Published 2011Get full text
Article -
19
A practical method for the analysis of genetic algorithms
Published 2011Get full text
Get full text
Get full text
Article -
20
