Search Results - (( _ simulation models algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- simulation models »
- models algorithm »
- java application »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Assessing the simulation performances of multiple model selection algorithm
Published 2015“…The capability of the algorithm in finding the true specification of multiple models is measured by the percentage of simulation outcomes.Overall results show that the algorithm has performed well for a model with two equations.The findings also indicated that the number of variables in the true models affect the algorithm performances. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The development of the simulation model consists of seven steps. The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
Get full text
Get full text
Get full text
Thesis -
10
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
Get full text
Get full text
Thesis -
11
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
Get full text
Get full text
Get full text
Article -
12
Incorporating the range-based method into GridSim for modeling task and resource heterogeneity
Published 2017“…In this paper, we propose a new simulation model that incorporates the range-based method into GridSim for modeling and simulating heterogeneous tasks and resources in order to capture the inherent heterogeneity of Grid environments that later can be used by other researchers to test their algorithms.…”
Get full text
Get full text
Get full text
Article -
13
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The results showed that the parallel algorithms for EHD simulations may provide 4 to 5 times more speedup over sequential algorithm for large grid sizes. …”
Get full text
Get full text
Thesis -
14
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…Relative mass release of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Simulation Model and Genetic Algorithm to Assembly Line Balancing
Published 2013“…The assembly line involves many famous problems that is unbalancing cycle time among the workstations. Simulation Model (SM) is one of the most useful modelling tool for the design of many types of systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
Get full text
Get full text
Monograph -
17
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…Thus limiting benefits on handling characteristic with current available algorithms. The research scope covered experimental measurements, simulation model correlation, and vehicle plant modelling using multibody approach (MSC Adams/Car), controller algorithm development in Matlab/Simulink and performance validation in co-simulation environment. …”
Get full text
Get full text
Article -
18
Development of Algorithm for QoS Model in Cloud Computing
Published 2021“…After that, we will develop our new algorithm for the QoS Model. Then, we simulate the new enhanced algorithm and compare to other algorithms.…”
Get full text
Get full text
Get full text
Article -
19
Modelling and simulation of hysteresis control algorithm for use in single phase ac-to-ac matrix converter / Seri Iryani Mohd Noor
Published 2003“…This thesis is illustrated by developing computer simulation models of ac-to-ac single phase matrix converter (SPMC) using sinusoidal pulse width modulation (SPWM) technique and another algorithm i.e hysteresis control technique. …”
Get full text
Get full text
Thesis -
20
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…Genetic algorithm and simulated annealing techniques are used to optimize the control parameters of the neural network. …”
Get full text
Get full text
Article
