Search Results - (( developing validation technique algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing validation »
- validation technique »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…This architecture is based on the combination of three well-known techniques, namely, artificial neural networks, fuzzy logic and genetic algorithm. …”
thesis::doctoral thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…The Linear-PSO algorithm was the first version of improvement. However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
Get full text
Get full text
Thesis -
10
DEVELOPMENT OF A FATIGUE DAMAGE MONITORING SYSTEM USING DIGITAL IMAGE CORRELATION
Published 2017“…Next, validation works were carried out to verify the algorithm, imaging system and the digital image correlation (DIC) technique. …”
Get full text
Get full text
Thesis -
11
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
Get full text
Get full text
Get full text
Thesis -
12
Design and Development of Hybrid Maximum Power Point Tracking Algorithm for Photovoltaic Cell
Published 2013“…Moreover designed algorithm is developed using matlab and will be validate using real time data from the PV cell and the output will be compared with current algorithms.…”
Get full text
Get full text
Final Year Project -
13
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…This paper describes the development and validation of landslides susceptibility models for mountainous regions using advanced data mining techniques. …”
Get full text
Get full text
Article -
14
A Study On Gene Selection And Classification Algorithms For Classification Of Microarray Gene Expression Data
Published 2005“…The Performance Of The Combined Techniques Is Validated By Using Leave-One-Out Cross Validation (Loocv) Technique And Receiver Operating Characteristic (Roc) Is Used To Analyze The Results. …”
Get full text
Get full text
Get full text
Article -
15
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The developed algorithms are two-band algorithm, terma linear and modified algorithm from the combination of the visible and infrared thermal bands. …”
Get full text
Get full text
Thesis -
16
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis -
17
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017“…Face recognition has been considered as a popular technique to recognise identity of a person. Many face recognition algorithms have been developed and modified by researchers. …”
Get full text
Get full text
Monograph -
18
Improved Boosted Decision Tree Algorithms by Adaptive Apriori and Post-Pruning for Predicting Obstructive Sleep Apnea
Published 2018“…The improved version of Boosted Decision Tree algorithm, named as Boosted Adaptive Apriori post-Pruned Decision Tree (Boosted AApoP-DT), was developed by referring to Adaptive Apriori (AA) properties and by using post-pruning technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
20
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
