Search Results - (( construct validation mining algorithm ) OR ( java data control algorithm ))
Search alternatives:
- construct validation »
- validation mining »
- mining algorithm »
- data control »
- java »
-
1
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
2
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
3
A random search based effective algorithm for pairwise test data generation
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
5
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Therefore, a replica control protocol must consider the dynamic aspects of the Data Grid. …”
Get full text
Get full text
Thesis -
6
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. The employment of automated toolbox is a straightforward process constructed from eight sub-tools to prepare, train, and processes the data. …”
Get full text
Get full text
Thesis -
8
Novel rule base development from IED-resident big data for protective relay analysis expert system
Published 2016“…Thus, the objective of this chapter is to study the design of an Expert System called ProtectiveRelay Analysis System (PRAY), which is imbedded with a rule base construction module. This module is to provide the facility of intelligently maintaining the knowledge base of PRAY through the prior discovery of relay operations (association) rules from a novel integrated data mining approach of Rough-Set-Genetic-Algorithm-based rule discovery and Rule Quality Measure. …”
Get full text
Get full text
Book Section -
9
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…In this context, proposing Forensic Examination and Analysis Methodology using Data mining (FED) and Forensic Examination and analysis methodology using Data mining and Optimization (FEDO) models address these issues. …”
Get full text
Get full text
Thesis -
10
MODELLING ANALYSIS FOR ACCURATE TROPICAL WEATHER FORECASTING
Published 2023“…The Random Forest, K-Nearest Neighbors, Support Vector Machines, XGBoost and Naïve Bayes algorithm is proposed to validate the model for rainfall prediction, which is proven to operate well with excellent accuracy in previous researches. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
-
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
