Search Results - (( adverse selection method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- adverse selection »
- selection method »
- method algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
New approach for sugarcane disease recognition through visible and near-infrared spectroscopy and a modified wavelength selection method using machine learning models
Published 2023“…These results outperformed those obtained by other wavelength selection approaches, including the selectivity ratio, variable importance in projection, and the baseline method of the flower pollination algorithm.…”
Get full text
Get full text
Get full text
Article -
9
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…It evaluates system formation methods, hierarchical structures, and leader selection criteria, comparing various parameters to identify factors influencing node formation and routing. …”
Get full text
Get full text
Get full text
Thesis -
10
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people
Published 2004“…This article describes ongoing research to overcome these limitations through the CoRGA program, which combines Cox regression with a genetic algorithm for the variable selection process. CoRGA was used to try and identify the best combination of risk factors for 4-year all-cause mortality. …”
Get full text
Get full text
Get full text
Article -
11
A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem
Published 2009“…The OCGA is compared with other well known local search method namely dynamic length tabu search, randomised steepest descent method, and other variants of genetic algorithms using extensive data sets collected from the literatures. …”
Get full text
Conference or Workshop Item -
12
Automatic microsleep detection based on KNN classifier utilizing selected and effective EEG channels
Published 2024“…Annually, the global economy suffers significant financial losses due to decreased productivity of work, accidents, and crashes in traffic resulting from microsleep. To reduce the adverse impacts of microsleep, it is necessary to have a discreet, dependable, and socially acceptable method of detecting microsleep episodes consistently throughout the day, every single day. …”
Get full text
Get full text
Get full text
Article -
13
Predicting noise-induced hearing loss (NIHL) in TNB workers using GDAM algorithm
Published 2012“…The performance of the proposed method known as ‘Gradient Descent Method with Adaptive Momentum (GDAM)’ is compared with ‘Gradient Descent Method with Adaptive Gain (GDM-AG)’ (Nazri, 2007) and ‘Gradient Descent with Simple Momentum (GDM)’ by performing simulations on classification problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements
Published 2022“…Third, to propose a fault-intrusion-tolerant algorithm (FITSW), which is based on both fault and intrusion-tolerant techniques, to decrease the adverse impact caused by different faults (accidental and malicious) in cloud computing systems. …”
Get full text
Get full text
Thesis -
15
Anti windup implementation on different PID structures
Published 2008“…In industry, there are various types of PID controllers in addition to the 'textbook' PID but most tuning methods were developed based on this ideal algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Design and development of real-time particulate matter measuring instrument applying laser scattering technique for microenvironment monitoring
Published 2020“…While PM has been has identified as one of global health threat by the World Health Organization (WHO), and there is an urgent need for routine air monitoring data on components of the PM mass to identify the role of PM chemical components in causing adverse health effects for exposure control, assessment of particle exposure on a more personal level are not achievable by the conventional method due to their high cost and relatively large size. …”
Get full text
Get full text
Get full text
Thesis -
17
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel
Published 2011“…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies
Published 2020“…The risk in this situation is that there would be a moral hazard and adverse selection based on information asymmetry among principal construction participants especially contractors; this outcome is called risk attitudes. …”
Get full text
Get full text
Get full text
Get full text
Article
