Search Results - (( developing function approach algorithm ) OR ( java applications mining algorithm ))
Search alternatives:
- developing function »
- applications mining »
- function approach »
- java applications »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil
Published 1998“…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…Subsequently, it is exploring into the development of random approaches based on MABSA, integrating components into others algorithm whereby Squirrel Search Algorithm (SSA), Cauchy Mutation (CM) approach, and Doppler Effect (DE) phenomenon. …”
Get full text
Get full text
Thesis -
10
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
11
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…The new approach algorithm speed increment has consistently increased in between 18% to 22% microsecond for encryption and 30% to 34% for decryption compared to Rijndael algorithm.…”
Get full text
Get full text
Thesis -
12
-
13
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…From standard static formula for bearing capacity of a single pile foundation, an algorithm using a reliability approach for the determination of service load was developed. …”
Get full text
Get full text
Article -
14
Review of Multi-Objective Swarm Intelligence Optimization Algorithms
Published 2021“…Integrating other different MOO approaches may help in developing more effective optimization algorithms, especially in solving complex MOPs. …”
Get full text
Get full text
Article -
15
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…A series of algorithms in solving the inverse problem were then developed corresponding to the forward models. …”
Get full text
Get full text
Thesis -
16
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…The new approach algorithm speed increment has consistently increased in between 18% to 22% microsecond for encryption and 30% to 34% for decryption compared to Rijndael algorithm depending upon the key length.…”
Get full text
Get full text
Article -
17
-
18
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…Individuals for the next generation are selected by using the objective function. Hence, a novel humanmachine interaction is developed in the proposed approach. …”
Get full text
Get full text
Thesis -
19
Stochastic optimal control of economic growth model under research and development investment with Kalman filtering approaches
Published 2022“…Moreover, the optimal control policy based on the state estimate generated from the UKF could optimize the cost function of the problem. Hence, the results show the efficiency of the algorithms proposed. …”
Get full text
Get full text
Article -
20
