Search Results - (( basic integration connection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- integration connection »
- connection algorithm »
- application mining »
- basic integration »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
An Integrated Approach to the Reduction of Reactive Power Losses in Radial Distribution Network
Published 2004“…The scope of study would be on the capacitor insertion in radial distribution network. An existing algorithm will be studied and an integrated approach to the reduction ofreactive power losses will be proposed. …”
Get full text
Get full text
Final Year Project -
8
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Furthermore, the identification data need to be monitored and transmitted to the business organizations, which are connected through the network. This has been achieved by the integration of RFID-XBee network with database connectivity through Internet of Things (IoT). …”
Get full text
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Mobile application for sign language learning with real time feedback
Published 2024“…Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…The design schemes of modeling adaptive and predictive FLC (APFLC) is described as follow: Basic FLC, Predictive FLC (PFLC) and APFLC. The APFLC is compared with a conventional Proportional Integral Derivative (PID) controller. …”
Get full text
Thesis -
13
Solar power inverter
Published 2013“…It is highlights the aspects of power electronic packaging concerning functional and packaging integration in solar inverter technology. Basically, it performs the conversion of the variable DC output of the Photovoltaic (PV) module(s) into a clean sinusoidal 50- or 60 Hz AC current that is then applied directly to the commercial electrical grid or to a local, off-grid electrical network. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…The results of EGWO-DV-Hop demonstrated superior localization accuracy under both topologies, the average localization error dropped up to 87.79% comparing with basic DV-Hop under C-shaped topology. The developed enhanced DWGWO-DVHop localization algorithm illustrated a favorable result with high accuracy and strong stability. …”
Get full text
Get full text
Thesis -
15
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…This research focuses on CT concepts that will be integrated with Mayer’s CTML in designing the learning material for young digital natives. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…It also achieves confidentiality, integrity and avoids any no-repudiation attack. The computational overhead shows that TLwS is at least 40% better than popular algorithm such as SeDS, UAKA-D2D, and D2D-Assist. …”
Get full text
Get full text
Thesis -
18
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…D2D communication is an integral part of LTE-Advance and 5G cellular networks, has gained a lot of popularity in recent years as it ofers high speed, extended coverage, and ubiquitous connectivity. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Optimal selection of location, sizing and power factor for solar PV plants using differential evolution
Published 2023Conference Paper -
20
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article
