Search Results - (( development formal function algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- development formal »
- function algorithm »
- application mining »
- java application »
- mining algorithm »
- formal function »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…Therefore, it is essential to determine control system safety in advance by verifying the possibility of state transitions from safe to unsafe states at the design and development stage. To overcome these issues, many researchers and engineers have been involved in formal methods research. …”
Get full text
Get full text
Get full text
Technical Report -
10
The nonlinear fabry-perot resonator: direct numerical integration
Published 2001“…The optical polarization P, rather than the optical E field, is retained as the dynamical variable. We develop an algorithm for integration of the nonlinear wave equation in P and with addition of the nonlinear boundary conditions at the resonator surfaces we are able to find the transmission as a function of intensity and frequency. …”
Get full text
Get full text
Article -
11
Method of Event Reconstruction in Digital Investigation and its Visualization
Published 2011“…An algorithm is developed to derive a Deterministic Finite Automaton (DFA) that accepts computations of FSM that represent the functionality of system under investigation. …”
Get full text
Get full text
Thesis -
12
Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg
Published 2006“…Currently, there is no ontology which is developed specify in metabolic pathway domain. Therefore, the main objective of this research is to develop an ontology-based representation for metabolic pathway to represent and to describe the concepts in the metabolic pathway domain and the relationships among them. …”
Get full text
Get full text
Thesis -
13
An improved marine predators algorithm tuned data-driven multiple-node hormone regulation neuroendocrine-PID controller for multi-input–multi-output gantry crane system
Published 2023“…Comparative findings alongside other existing metaheuristic-based algorithms confirmed excellence of the proposed method through its superior performance against the conventional MPA, particle swarm optimization (PSO), grey wolf optimizer (GWO), moth-flame optimization (MFO), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), salp-swarm algorithm (SSA), slime mould algorithm (SMA), flow direction algorithm (FDA), and the formally published adaptive safe experimentation dynamics (ASED)-based methods.…”
Get full text
Get full text
Get full text
Article -
14
Fuzzy methodologies for automated University timetabling solution construction and evaluation
Published 2008“…New algorithms to calculate what is loosely termed the lower limits and upper limits of the proximity cost function for any problem instance are also presented. …”
Get full text
Get full text
Get full text
Thesis -
15
Performance analysis of predictive functional control for automobile adaptive cruise control system
Published 2023“…Thus, the findings from this work can become a good initial motivation to explore further the capability of the PFC algorithm for future ACC development.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Outlier Detections and Robust Estimation Methods for Nonlinear Regression Model Having Autocorrelated and Heteroscedastic Errors
Published 2010“…Finally, we proposed statistics practitioners to use the formal modeling algorithms to get better inferences. …”
Get full text
Get full text
Thesis -
17
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. …”
Get full text
Get full text
Article -
18
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…We model the solution in the real setting of SDNs using High Level Petri Nets (HLPN), analyze the rules with Z language, and formally verified the correct functioning using Z3 SMT solver. …”
Get full text
Get full text
Thesis
