Search Results - (( developing development within algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- within algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Active intelligent control of vibration of flexible plate structures
Published 2011“…The approach is realised within SISO and SIMO AVC structures using RCGA, PSO and AIS algorithms. …”
Get full text
Get full text
Thesis -
9
Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem
Published 2015“…It is expected that the developed algorithm will perform well if not a par with Johnson’s algorithm…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network
Published 2005“…The first approach is to develop an efficient sequential algorithm for the window method. …”
Get full text
Get full text
Thesis -
11
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
Get full text
Get full text
Thesis -
12
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…OSA. The prediction algorithms developed are based on the OSA datasets collected mainly from the public hospitals in Selangor, Malaysia. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
16
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…To accomplish this task, a coordinating algorithm was developed that allows the robots to work together in a distributed manner. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Development of indexer considering tag weighting for XML document / Masliana Wahid @ Buang
Published 2005“…This research is used the inverted file method for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Thesis -
18
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
Get full text
Get full text
Get full text
Thesis -
19
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…There are many stemming method that have been developed. However, the main focus of this project is on Porter Stemming Algorithm which has been developed by M.F Porter in 1980. …”
Get full text
Get full text
Final Year Project -
20
DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES
Published 2019“…We can conclude that the project was able to achieve its objectives within the stipulated timeframe.…”
Get full text
Get full text
Final Year Project
