Search Results - (( developing formative during algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing formative »
- application mining »
- formative during »
- during algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Development of a mathematical model for the prediction of chip formation instability and its verification by fuzzy logic with genetic algorithm
Published 2010“…It has been identified that the chip formation process has a discrete nature, associated with the periodic shearing process of the chip during machining of different materials. …”
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
10
Effect of viscous dampers on yielding mechanisms of RC structures during earthquake
Published 2015“…For this purpose, adapting the Newmark method, a finite element algorithm was developed for the nonlinear dynamic analysis of reinforced concrete buildings equipped with VDs that are subjected to earthquake. …”
Get full text
Get full text
Get full text
Article -
11
Guidance and control for satellite in-orbit-self-assembly proximity operations
Published 2015“…Numerical nonlinear simulations that illustrate the performance and accuracy of the proposed algorithms are performed in a cubic formation assembly.…”
Get full text
Get full text
Get full text
Article -
12
Designated Path Routing Algorithm For Dense Wireless Sensor Network
Published 2021“…Thus, a tailored solution is required since oil and gas industry relies heavily on sensor data to keep track of pipelines condition to prevent anomalous events from happening. The proposed algorithm has been developed to optimize the network performance by dividing the traffic into two and by reducing the flooding during route discovery. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Hybrid BLEU Algorithm For Structured Exam Management System
Published 2008“…Due to this problem, "Hybrid BLEU algorithm for Structured Exam Management System " is develop to aid the lecturers during assessment in the construction of quiz and test. …”
Get full text
Get full text
Get full text
Thesis -
14
Image processing: enhancement of x-ray film to detect breast cancer / Dzuzlindah Muhamad Alias
Published 1996“…The image were then restored by histogram modification and histogram equalization technique. The algorithm and high language software such as Borland C++ 4.5 and Borland Visual Solution Pack were used to develope this techniques. …”
Get full text
Get full text
Thesis -
15
Analysis of daytime and nighttime ground level ozone concentrations using boosted regression tree technique
Published 2017“…Results showed that the model developed was within the acceptable range and could be used to understand ozone formation and identify potential sources of ozone for estimating O3 concentrations during daytime and nighttime Results indicated that the wind speed, wind direction, relative humidity, and temperature were the most dominant variables in terms of influencing ozone formation. …”
Get full text
Get full text
Get full text
Article -
16
Conventional and intelligent models for detection and prediction of fluid loss events during drilling operations: A comprehensive review
Published 2020“…Fluid loss to subsurface formations is a challenging aspect during drilling operations in petroleum industry. …”
Get full text
Get full text
Article -
17
Empirical relationship on vortex formation and heat transfer coefficient (HTC) using synthetic jet cooling / Nawal Radhiah Mohamad Nasir
Published 2023“…The ability of the vortex formation to reach the heated surface is important to maximize the HTC value and the radius of vortex formation does not play huge role if the distance between the vortex formation and the heated plate is high. …”
Get full text
Get full text
Thesis -
18
Conventional and intelligent models for detection and prediction of fluid loss events during drilling operations: a comprehensive review
Published 2020“…Fluid loss to subsurface formations is a challenging aspect during drilling operations in petroleum industry. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Trajectory planning and simulation for 3d printing process
Published 2022“…Development of the simulator was started with the development of STL file reader to extract the triangular facets’ vertices from a STL file in ASCII format. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
