Search Results - (( developing usage connection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- connection algorithm »
- application mining »
- developing usage »
- usage connection »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…Moreover, navigation pattern mining has been done by finding connected components in the graph. In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
Get full text
Get full text
Thesis -
8
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
Get full text
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Smart IoT energy optimisation and localisation monitoring for e-bike sharing
Published 2025“…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Boundary control of a dual-output boost converter with multilevel inverter topology / Messikh Tarek
Published 2017“…With the development of power electronics applications and the usage of green power technology, many multilevel converters have been proposed. …”
Get full text
Get full text
Get full text
Thesis -
12
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
13
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…In modern manufacturing industry context, Automated Guided Vehicles (AGVs) are mobile robots used in aiding the process of material handling from one point to a desired location in the workplace. Development on AGVs is a trending discussion among researchers due to its wide usage and the implementation of the Industrial 4.0. …”
Get full text
Get full text
Get full text
Article -
14
Design and implementation of a portable signal analyzer for residence Low Voltage (LV)
Published 2023“…Ongoing technological improvement, power quality of supply has become importance aspect need to be concern in domestic usage or industrial development. Study shows that power quality are developing from instant data become constant monitoring measurement. …”
text::Final Year Project -
15
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
16
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The developed algorithm is simulated in LTE-Sim simulator released 5 in terms of three QoS metrics (1) Packet Loss Ratio (2) Delay (3) Throughput. …”
Get full text
Get full text
Get full text
Thesis -
17
A rule-based energy management system for hybrid renewable energy sources with battery bank optimized by genetic algorithm optimization
Published 2025“…For this purpose, a Rule-Based EMS (RB-EMS) that employs State Flow (SF) to guarantee a safe and reliable operating power flow to the NG has been developed. In addition to that, a Genetic Algorithm (GA)-based optimization system and Simulated Annealing optimization Algorithm (SAA) were proposed to determine an economical solution for decreasing the cost of the NG system depending on its operational constraints. …”
Article -
18
Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique
Published 2022“…Apart from that, DC-DC boost converter would be the intermediate in developing the algorithm to the system. The extraction of the maximum output power can be achieved through this mechanism. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis -
20
Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks
Published 2003“…The key feature of this framework is the bandwidth reallocation scheme. This scheme is developed to control the bandwidth operation of ongoing connections when the system is overloaded. …”
Get full text
Get full text
Thesis
