Search Results - (( developing alternative normalization algorithm ) OR ( java applications mining algorithm ))
Search alternatives:
- alternative normalization »
- normalization algorithm »
- developing alternative »
- applications mining »
- java applications »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Towards the utilization of normalized LMS algorithm in adaptive filter
Published 2014“…Therefore, studies on reducing engine noise have become the main era where an alternative suggestions is still needed. In this paper, we focused on how the development of algorithms helped reduce the level of noise. …”
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
-
10
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
Get full text
Get full text
Get full text
Article -
11
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
Get full text
Get full text
Get full text
Article -
12
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
13
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
14
Development of cardioid based graph ECG heart abnormalities classification technique
Published 2015“…In this study, the development of Cardioid based graph electrocardiogram heart abnormalities classification technique is presented. …”
Get full text
Get full text
Get full text
Article -
15
Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm
Published 2019“…This work proposes an improvement to the original adaptive sampling algorithm and uses it as the sampling method for eye diagram modeling. …”
Get full text
Get full text
Thesis -
16
Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System
Published 2006“…Presently, interlocking mortarless masonry system has been developed as an alternative to the conventional mortared masonry system for wall construction. …”
Get full text
Get full text
Thesis -
17
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
18
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Researchers have been developing a system using intrusion detector approach base on differential analysis. …”
Get full text
Get full text
Monograph -
20
Sleep apnea detection using cardioid based grap
Published 2016“…In this study, the development of Cardioid based graph electrocardiogram heart abnormalities classification technique is presented. …”
Get full text
Get full text
Get full text
Article
