Search Results - (( evolution information needs algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- evolution information »
- application mining »
- java application »
- mining algorithm »
- needs algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
An implementation of differential evolution algorithm for a single product and single period multi-echelon supply chain network model
Published 2018“…In this paper, five variants of Differential Evolution (DE) algorithms are proposed to solve the multi-echelon supply chain network optimization problem. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
10
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
Get full text
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
-
13
Evaluation of Search Result of Document Search Based GA (DSEGA)
Published 2004“…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Delay-Prioritized Scheduling (DPS) for Real Time Traffic in 3GPP LTE System
Published 2010“…The proposed algorithm utilizes each user’s packet delay information and its instantaneous downlink channel conditions when making scheduling decisions. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
A comparative study for parameter selection in online auctions
Published 2009“…Due to the complex and dynamic nature of the online auction, one of the strategies employed is using genetic algorithm to discover the best strategy. Hence, this work attempts to improve an existing bidding strategy by taking into accounts the evolution of various model of generic algorithm in optimizing the parameter of the bidding strategies. …”
Get full text
Get full text
Get full text
Thesis -
17
Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme
Published 2014“…CQI feedback is an essential technique in describing the channel state information of LTE system. Hence, CQI calculations highly depend on the accuracy of the channel estimation process. …”
Get full text
Get full text
Thesis -
18
Handbook of research on smart computing for renewable energy and agro-engineering
Published 2019“…While existing technologies may help in crop processing, there is a need for studies that seek to understand how modern approaches like artificial intelligence, fuzzy logic, and hybrid algorithms can aid the agricultural process while utilizing energy sources efficiently. …”
Get full text
Get full text
Book -
19
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
Get full text
Get full text
Thesis -
20
