Search Results - (( changes realization based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- realization based »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm
Published 2025“…However, Chinese language features are rich and fuzzy, and the training optimization of lip-reading model requires high GPU computation and storage, so it is difficult to realize large-scale application. Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
10
Black widow optimization-based optimal PI-controlled wind turbine emulator
Published 2023“…Finally, the proposed system is realized in real-time by hardware experimentations. …”
Article -
11
Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri
Published 2007“…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
Get full text
Get full text
Thesis -
12
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
13
Simultaneous controllers for stabilizing the frequency changes in deregulated power system using moth flame optimization
Published 2022“…The performance of MFO-based 2DOF PID-FOPDN is evaluated against Cuckoo search (CS), Bat algorithm (BA), and Teaching learning-based optimization (TLBO) approaches in different contract scenarios of deregulated system. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad
Published 2018“…A metaheuristic algorithm in the UFLS scheme can be used to select the best load combination in real time. …”
Get full text
Get full text
Get full text
Thesis -
15
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…Their main weakness is these algorithms always fail to track MPP and high oscillation occurs whenever the sunlight (irradiance) changes frequently. …”
Get full text
Get full text
Thesis -
16
UiTM Transportation Unit bus trip scheduling system / Noorzawanah Ab Rahim
Published 2009“…The proposed heuristic algorithm is based on the simple greedy search, that guide the search efficiently and able to find good solutions. …”
Get full text
Get full text
Thesis -
17
Enhanced-PID Control Based Antagonistic Control For Pneumatic Artificial Muscle Actuators
Published 2016“…Some past control algorithms on the positioning control of PAM mechanisms are discussed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Network reconfiguration using PSAT for loss reduction in distribution systems
Published 2010“…Network reconfiguration in distribution system is realized by changing the status of sectionalizing switches, and is usually done for the purpose of loss reduction. …”
Get full text
Conference or Workshop Item -
19
Malaysia network transit route adviser system
Published 2010“…MANTRA using Dijkstra's Algorithm to realize these functions. frIANTRA 98% successfully to advice the tourist goes to the destination using Malaysia Transit.…”
Get full text
Get full text
Undergraduates Project Papers -
20
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…The current analysis tools and algorithms employed by the business organization were not designed to analyze the ever dynamic changes in taste and preferences of users when predicting the buying intent ion. …”
Get full text
Get full text
Conference or Workshop Item
