Search Results - (( development operations using algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- development operations »
- application mining »
- operations using »
- java application »
- mining algorithm »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
-
9
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…The comparison of the result of the developed integrated algorithm using two benchmark FMS scheduling algorithms datasets is conducted. …”
Get full text
Get full text
Thesis -
10
A parallel XTS encryption mode of operation
Published 2009“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…The proposed algorithm using NAF to represent the scalar in ECSM reduced the cost of computation of the ECSM by comparing with using the binary and NAF algorithm respectively. …”
Get full text
Get full text
Get full text
Thesis -
12
A hybrid bat–swarm algorithm for optimizing dam and reservoir operation
Published 2019“…Recently, evolutionary algorithms (EA) are used to develop optimal operation rules for dam and reservoir water systems. …”
Get full text
Get full text
Article -
13
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
Get full text
Get full text
Thesis -
14
-
15
Optimization of operational policies for the Minab Reservoir, Southern Iran
Published 2012“…An algorithm was also developed for reservoir storage to determine the benefits of water conservation and reservoir water release to optimize reservoir operations in drought periods. …”
Get full text
Get full text
Thesis -
16
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…These limitations in XTS have been successfully overcome by the enhanced parallel XTS mode of operation which gives a 1.80 speedup factor with 90 percent efficiency using AES as an encryption algorithm. …”
Get full text
Get full text
Thesis -
17
Photovoltaic shunt active power filter based on indirect self-charging with step size error cancellation and simplified adaptive linear neuron
Published 2017“…Laboratory prototype was then developed and digital signal processor (DSP) TMS320F28335 was used to perform the computation of algorithms. …”
Get full text
Get full text
Thesis -
18
Operating a reservoir system based on the shark machine learning algorithm
Published 2018“…In the current study, the shark machine learning algorithm (SMLA) is proposed to develop an optimal rule for operating the reservoir. …”
Get full text
Get full text
Article -
19
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
20
