Search Results - (( developing effective context algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- effective context »
- context algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Multilevel optimization for dense motion estimation
Published 2011“…We evaluated the performance of different optimization techniques developed in the context of optical flow computation with different variational models.In particular, based on truncated Newton methods (TN) that have been an effective approach for large-scale unconstrained optimization, we developed the use of efficient multilevel schemes for computing the optical flow.More precisely, we evaluated the performance of a standard unidirectional multilevel algorithm - called multiresolution optimization (MR/Opt), to a bidrectional multilevel algorithm - called full multigrid optimization (FMG/Opt).The FMG/Opt algorithm treats the coarse grid correction as an optimization search direction and eventually scales it using a line search. …”
Get full text
Get full text
Get full text
Monograph -
9
Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim
Published 2019“…The goal of this mobile application is to provide a tool for caregivers to remote monitor diabetic patients, even when they are not nearby. Context-aware algorithm is applied in this application, where a criticality reading threshold is defined, classifying the readings criticality levels. …”
Get full text
Get full text
Thesis -
10
Algorithm for the legal regulation of internet financial crime
Published 2024“…The study on the legal regulation of Internet financial crime holds significant importance in the context of the rapid development of China’s Internet finance and the increasing prevalence of crime in this sector. …”
Get full text
Get full text
Get full text
Article -
11
Dynamic radius for context- aware recommender system
Published 2021“…In this paper, a dynamic search radius algorithm is introduced as part of a context-aware recommender framework. …”
Get full text
Get full text
Get full text
Article -
12
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Get full text
Article -
13
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Article -
14
Development Of Load Control Algorithm For PV Microgrid
Published 2017Get full text
Get full text
Get full text
Article -
15
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…Based on the acquired results, the experiments reveal that the modified word vectors algorithm can effectively alter original LLM-generated word vectors to reflect intended contexts and can outperform baseline scores in contextual text classification tasks. …”
Get full text
Get full text
Thesis -
16
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A comparative analysis of machine learning algorithms for diabetes prediction
Published 2024“…As per the findings, the RF algorithm attained the maximum accuracy of 77% in the context of PIDD. …”
Get full text
Get full text
Get full text
Article -
18
Optimization of fuzzy rules design using genetic algorithm
Published 2000Get full text
Get full text
Get full text
Article -
19
New Evolving Fuzzy System Algorithms Using Dynamic Constraint
Published 2016Get full text
Get full text
Thesis -
20
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. …”
Get full text
Get full text
Thesis
