Search Results - (( access learning learning algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- learning algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
-
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021Get full text
Get full text
Article -
8
-
9
-
10
-
11
The Evolutionary Convergent Algorithm: A Guiding Path of Neural Network Advancement
Published 2025Article -
12
Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions
Published 2023“…Thus, this proposed system employs a data science-based framework and six highly advanced data-driven Machine learning and Deep learning algorithms: Support Vector Regressor, Auto-Regressive Integrated Moving Average (ARIMA), Facebook Prophet, Unidirectional LSTM, Bidirectional LSTM, Stacked LSTM. …”
Get full text
Get full text
Article -
13
-
14
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Moreover, applying machine learning algorithms in the identification and classification of conflicting flows has limitations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022“…To capture the spatiotemporal channel state information (CSI), the second proposed algorithm adopts machine learning techniques with anchor graph hashing to extract generalized features before feeding them into the DQN. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
-
19
-
20
