Search Results - (( data identification method algorithm ) OR ( java implementation from algorithm ))
Search alternatives:
- identification method »
- data identification »
- java implementation »
- implementation from »
- method algorithm »
- from algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
-
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
Get full text
Get full text
Get full text
Article -
5
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Inter-connectivity capabilities make it possible for devices to work collaboratively to significantly improve efficiency and productivity with the assistance of automation. However, machines from different domains collaborate on the same data and task, raising security and privacy concerns about cross-domain communications. …”
Get full text
Get full text
Thesis -
6
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
7
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
9
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
10
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
11
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
12
Evapotranspiration prediction using system identification and genetic algorithm
Published 2012Get full text
Working Paper -
13
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
14
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
15
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
16
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
18
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
Get full text
Get full text
Get full text
Article -
20
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item
