Search Results - (( filing adoption optimization algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- adoption optimization »
- application mining »
- java application »
- mining algorithm »
- filing adoption »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
-
4
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…The proposed new algorithm has more optimal CR than the various variants of the Huffman-based lossless application. …”
Get full text
Get full text
Get full text
Thesis -
5
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Test Cases Minimization Strategy Based On Flower Pollination Algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
Dynamic replica replacement strategy in data grid
Published 2012“…Replication approach can shorten the time of fetching the files by creating many replicas stored in appropriate sites. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…In fact, bandwidth estimation is very beneficial to optimize the performance of end-to-end transport in several overlay applications such as Content Distribution Networks (CDNs), Peer-to-Peer (P2P) file sharing, and dynamic overlay routing. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Then, all the workload that are obtained to determine the processes are recorded into one excel file. The Case Based Reasoning (CBR) optimized with Hash Search Technique has been adopted in this study for the purpose of evaluating and predicting the workload performance of PostgreSQL DBMS. …”
Get full text
Get full text
Get full text
Get full text
Thesis
