Search Results - (( developing based cp algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- developing based »
- java application »
- mining algorithm »
- cp algorithm »
- based cp »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning
Published 2017“…In addition, a new ri is developed using case-based reasoning and is then plugged into the rop framework. …”
Get full text
Get full text
Thesis -
9
Fault location in unbalanced distribution system including distributed generation units using multi-layer feed forward neural network
Published 2014“…Fault location finding process in distribution network is totally different based on the application of developed algorithms for the transmission lines due to characteristics of distribution system. …”
Get full text
Get full text
Thesis -
10
Specific heat capacity extraction of soybean oil/mxene nanofluids using optimized long short-term memory
Published 2024“…Maximum specific heat capacity nanofluids (cpNF) augmentation is 24.49% at 0.125 wt.% loading of Ti3C2 in the base oil. …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
Published 2019“…Based on the simulation results, the proposed algorithm has improved the overall workflow scheduling effectiveness in comparison with existing algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Some Metaheuristics for Tourist Trip Design Problem
Published 2023“…We also compared the proposed method with the Posteriority approach to MOP. The results show that CP-based algorithms are superior to NSGA-II in finding a Pareto frontier. …”
Get full text
Get full text
Conference or Workshop Item -
14
Fault detection and diagnosis using correlation coefficients
Published 2005“…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
Get full text
Get full text
Thesis -
15
PLL-less SRF technique for operation of SAPF under unbalanced and distorted supply voltage
Published 2018Get full text
Get full text
Conference or Workshop Item -
16
-
17
Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems
Published 2018“…We develop two algorithms: 1) the nonlinear algorithm of extreme doubly stochastic quadratic operator (NLAEDSQO) to generate all the convergent EDSQOs and 2) the nonlinear convergence algorithm (NLCA) of EDSQOs to investigate the optimal consensus for MAS. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
19
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Inverse kinematic solution in handling 3R manipulator via real-time genetic algorithm
Published 2023Conference paper
