Search Results - (( developing executive normalization algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- normalization algorithm »
- developing executive »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R
Published 2020“…As to perform these studies, literature review has been executed together with the prototype development. …”
Get full text
Get full text
Final Year Project -
9
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Convolution Neural Network (CNN) using deep learning algorithm is chosen in identifying frequency of movement and execution time of housebreaking crime. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Open architecture pc-based CNC controller
Published 2006“…Besides having all normal controller functions, the developed controller also permit upgradeable and interchangeable controller functions. …”
Get full text
Get full text
Research Report -
12
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
Get full text
Get full text
Final Year Project -
13
Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT)
Published 2014“…However, exhaustive testing that required lot of time and financial resources is normally impossible. This thesis is about the research on developing a pairwise test suite generator tool based on Harmony Search Algorithm (HS-PTSGT) to generate optimum test suite. …”
Get full text
Get full text
Undergraduates Project Papers -
14
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The result of these tests showed that the wireless sniffer was able to identify all normal gap, spoofing, high gap between successive frames, out of order and retransmit frames. …”
Get full text
Get full text
Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
16
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
2-D Reconstruction of Breast Image Using Forward-Backward Time-Stepping Method for Breast Tumour Detection
Published 2012“…In this paper, time-domain inverse-scattering technique referred to as Forward-Backward Time-Stepping (FBTS) method is applied to microwave imaging breast cancer detection. The FBTS algorithm is implemented in C++ language executed in a single computer by developing the time domain form of the FDTD. …”
Get full text
Get full text
Proceeding -
19
-
20
VGG16-based deep learning architectures for classification of lung sounds into normal, crackles, and wheezes using Gammatonegrams
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item
