Search Results - (( dramatic implementation from algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- dramatic implementation »
- implementation from »
- application mining »
- java application »
- mining algorithm »
- from algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
Get full text
Get full text
Final Year Project -
8
Big data clustering using grid computing and ant-based algorithm
Published 2013“…Big data has the power to dramatically change the way institutes and organizations use their data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…We have chosen four neighborhood based algorithms which are commonly used in optimization problems and divided them in newly implemented and re-implemented category. …”
Get full text
Get full text
Thesis -
11
A technical framework analysis of digital twin control algorithms for HVAC-BMS Integration and implementation challenges for Malaysian green buildings
Published 2025“…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
Get full text
Get full text
Get full text
Article -
12
Feedforward backpropagation, genetic algorithm approaches for predicting reference evapotranspiration
Published 2015“…The capabilities of feedforward backpropagation neural networks (FFBP) in predicting reference evapotranspiration (ET0) are evaluated in this paper in comparison with the empirical FAO Penman-Monteith (P-M) equation, later a model of FFBP+Genetic Algorithm (GA) is implemented for the same evaluation purpose. …”
Get full text
Get full text
Get full text
Article -
13
Students’ attitude towards video-based learning: machine learning analysis with rapid software / Abdullah Sani Abd Rahman ... [et al.]
Published 2022“…The recent computer and Internet technologies have dramatically impacted many facets of education. There has been a rapid rise mainly since the COVID19 pandemic in the use of video-based learning implemented via online classroom setting. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter
Published 2023“…The proposed algorithm also improved the design by eliminating the needs of low pass filter as others time domain algorithms. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Beyond the classroom: digital language learning in the Malaysian context
Published 2024“…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
Get full text
Get full text
Get full text
Article -
18
QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics
Published 2016“…The algorithm mentioned in the study reduces the computational complexity problem which is one of the main issues that accompany currently used tap filter algorithms, such as (LMS) and (RLS). …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Structural crack detection using deep convolutional neural network / Raza Ali
Published 2022“…In this work, CNN is implemented for civil structural crack detection. Cracks are significant indicators for the evaluation of the structural health and monitoring process. …”
Get full text
Get full text
Get full text
Thesis
