Search Results - (( developing formative integration algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- formative integration »
- integration algorithm »
- developing formative »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. …”
Get full text
Get full text
Get full text
Thesis -
8
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
9
-
10
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Optimisation of fed-batch fermentation process using deep reinforcement learning
Published 2023“…At the same time, the total ethanol formation is 0.19 g/l and 0.03 g/l lower than the exponential feeding and genetic algorithm, respectively. …”
Get full text
Get full text
Get full text
Thesis -
13
Development of an integrated model for production planning and cell formation in cellular manufacturing systems
Published 2010“…However, only a few studies explicitly and simultaneously incorporate the CMS context, production planning and cell formation problem. In this thesis, a mathematical programming model is developed using an integrated approach for production planning and CF problems in a CMS. …”
Get full text
Get full text
Thesis -
14
The use of the Bayesian approach in the formation of the student's competence in the ICT direction
Published 2019“…The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
Get full text
Get full text
Conference or Workshop Item -
15
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…This optimizes data transmission, enhances energy efficiency, and extends network longevity. The ACO algorithm integrates multiple criteria, ensuring routes are short and energy-efficient. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Registration and billing system
Published 2005“…To over come these problems,a Registration and Billing System Prototype have been developed.The format of the system prototype is a web-based application.The purpose of this development is to solve the existing problems found in the existing system.A software development process called Rapid Software Development Life Cycle(RSDLC) has been used to develop this system prototype.The purpose of using this software development process is to shorten the time for the software development process.The tools of the software development are Macromedia Dreamweaver MX 6.0; the JSP web dynamic programming language and Oracle 9i as the system database.The Registration and Billing System Prototype uses an integrated system database to store the patient data. …”
Get full text
Get full text
Undergraduates Project Papers -
19
-
20
Constraint preserving mapping algorithm for XML storage
Published 2006“…The use of XML as the common format for representing, exchanging, storing, integrating and accessing data poses many new challenges to database systems. …”
Get full text
Get full text
Conference or Workshop Item
