Search Results - (( concern evaluation method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- concern evaluation »
- application mining »
- evaluation method »
- method algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability margin (VSM) can be basically identified by the multi-solution load flow calculation method. A systematic method for selecting the ANN's input variables was developed using Matlab Programming language.…”
Get full text
Get full text
Thesis -
11
A Two Pressure-Velocity Approach for Immersed Boundary Methods in Three Dimensional Incompressible Flows
Published 2013“…To address that concern, a new algorithm to correct the pressure and the velocity using Simplified Marker and Cell method is added. …”
Get full text
Get full text
Conference or Workshop Item -
12
Incorporating the range-based method into GridSim for modeling task and resource heterogeneity
Published 2017“…As heterogeneity is one of the unique characteristics of Grid computing, which induces additional challenges in designing heuristic-based scheduling algorithms, the main concern when performing simulation experiments for evaluating the performance of scheduling algorithms is how to model and simulate different Grid scheduling scenarios or cases that capture the inherent nature of heterogeneity of Grid computing environment. …”
Get full text
Get full text
Get full text
Article -
13
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
14
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…Over the past decade, the clustering ensemble has been emerged as a prominent method as far as the improving of clustering accuracy is concerned. …”
Get full text
Get full text
Thesis -
17
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…In order to achieve the objective, Weighted Sum-Dijkstra’s Algorithm (WSDA), a combination method between WSM and Dijkstra’s Algorithm is applied to solve multiple criteria network problems. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…Additionally, our analysis delves into machine learning techniques, discusses metrics and simulation tools to validate collision avoidance systems, and delineates local and global algorithmic perspectives. Our evaluation reveals significant challenges in current drone collision prevention algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…To address these problems, a novel method combining a covering rough set and a K-Means clustering algorithm (RK-Means) was proposed in this paper. …”
Article
