Search Results - (( developing block path algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- developing block »
- java application »
- mining algorithm »
- path algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow: article / Nurul Ain Husaini
Published 2010“…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
Get full text
Get full text
Article -
4
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow / Nurul Ain Husaini
Published 2010“…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
Get full text
Get full text
Student Project -
5
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…Using this method, the need for the knowledge of the degree of nonlinearity in advance can be avoided. The proposed algorithm models the Wiener-Hammerstein linear and nonlinear components in the secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design.In previous works, SEF-NLFXLMS and THF-NLFXLMS algorithms for Hammerstein and Wiener structures were developed where the acoustic path is assumed to be a unit gain. …”
Get full text
Get full text
Thesis -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…Genetic algorithm is also applied for the calibration of proposed model in terms of calibrated coefficients. …”
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
15
Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT
Published 2025“…The system employs a marker-based localisation method using QR codes decoded with the ZXing library to establish the user’s initial position. Navigation paths are optimised using the A* algorithm, while ARCore integrates sensor data from the device’s gyroscope and accelerometer to enhance tracking accuracy. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…In past two decades, Internet has developed rapidly and has integrated in many aspects of human life. …”
Get full text
Get full text
Thesis -
17
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Motion estimation on homogenous surface for around view monitoring system
Published 2020“…The procedure is time-consuming and increases the cost of development. We propose to develop two ultra-wide-angle cameras located on the front and rear vehicle integrated with the motion estimation (ME) algorithm to produce a parking bird eye view and forward/backward trajectory lines. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Performance analysis of pair-wise error probability for 1/3 and 1/4 subcarrier mapping ICI-SC scheme in STFBC MIMO-OFDM system / Norhayati Abdullah
Published 2015“…ICI and maximum frequency diversity can also be achieved by manipulating the Space Time Frequency Block Codes (STFBCs) that uses spatial, time and frequency diversities which is implemented in the MIMO-OFDM system. …”
Get full text
Get full text
Thesis -
20
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…The key innovation is to implement DNA sequence assembly algorithms on ASIC to make it a synthesisable IP block. …”
Get full text
Get full text
Thesis
