Search Results - (( _ normalization mining algorithm ) OR ( java application design algorithm ))
Search alternatives:
- application design »
- mining algorithm »
- java application »
- design algorithm »
- normalization »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
4
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The scale-up experiment showed that the proposed algorithm is more scalable than the other existing algorithms. …”
Get full text
Get full text
Thesis -
5
Data normalization techniques in swarm-based forecasting models for energy commodity spot price
Published 2014“…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Clustering is an unsupervised classification method with aim of partitioning, where objects in the same cluster are similar, and objects belong to different clusters vary significantly, with respect to their attributes. The K-means algorithm is a famous and fast technique in non-hierarchical cluster algorithms. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
9
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
10
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
11
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
12
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
13
-
14
Concept Based Lattice Mining (CBLM) using Formal Concept Analysis (FCA) for text mining
Published 2019“…The focus of this study is on the method of Concept Based Lattice Mining (CBLM) where similarities among output lattices will be compared using their normalized adjacency matrices, utilizing a distance measure technique. …”
Get full text
Get full text
Conference or Workshop Item -
15
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
Get full text
Get full text
Thesis -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
-
19
-
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis
