Search Results - (( frames validation study algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- frames validation »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model
Published 2025“…While the focus was on comparing standalone and hybrid models, the study identifies opportunities for future benchmarking against external tools to further validate its contributions. …”
Get full text
Get full text
Thesis -
9
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Specifically, each frame is modeled/represented as a regional adjacency graph (RAG). …”
Get full text
Get full text
Get full text
Thesis -
10
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
11
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011“…This research produced a mechanism to deal with missing data in Hadith database, 999 Hadiths from Sahih Al-Bukhari, Jami'u Al-Termithi and Selseelt AlaHadith Aldae'ifah w' Almadu'h were framed the sample of this study, the attributes of the hadith database were gained according to the validate methods of Hadith science, the experiment applied C4.5 algorithm to extract the rules of classification. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Analytical model for partially prestressed concrete beam-column elements
Published 2017“…Besides, based on an extensive review of the literature, there is less information available about the possibility of identifying the damage in partially prestressed concrete beams and frame structures during earthquake excitation. Hence, in this study a new analytical model for PPC frame elements subjected to static and dynamic loads is developed. …”
Get full text
Get full text
Get full text
Thesis -
13
Novel Architecture for Transactive Energy Management Systems with Various Market Clearing Strategies
Published 2023“…The proposed framework is validated with different case studies considering ten residential participants in a locality. …”
Get full text
Get full text
Article -
14
Fuzzy voice classifier and fuzzy voice pathology identification system
Published 2012Get full text
Working Paper -
15
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…This scheme performs two main operations which is the data-frame interleaving and intra-frame data encryption using bit swapping. …”
Get full text
Get full text
Final Year Project -
16
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
Get full text
Get full text
Thesis -
17
STRUCTRAL BEHA VIORE OF REINFORCED CONCRETE BEAMS STRENGTHED FOR SHEAR USING CFRP LAMINATES SUBJECTED TO CYCLIC LOADING
Published 2010“…The results from the analytical model were compared with corresponding experimental ones in order to confirm the validity of the analytical algorithm. The comparison between the analytical results and the published results gave a good agreement which indicates that experimental methodology proved to be appropriate and valid and that the analytical algorithm is quite efficient tool to study the structural behaviour of such element under cyclic loading as well as monotonic loading. …”
Get full text
Get full text
Thesis -
18
An automated high-accuracy detection scheme for myocardial ischemia based on multi-lead long-interval ECG and Choi-Williams time-frequency analysis incorporating a multi-class SVM...
Published 2021“…The high degree of classification accuracy for the different and unknown data sources used in this study reflects the flexibility, validity, and reliability of this proposed scheme. …”
Get full text
Get full text
Article -
19
Success history moth flow optimization for multi-goal generation dispatching with nonlinear cost functions
Published 2023“…As a benchmark test system for validating the efficacy of SHMFO, IEEE 30-bus systems are studied. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Simulation and experiments are performed to validate the design concept of LTDMA scheme and evaluate the sensor node's throughput, power consumption and the efficiency of the proposed embedded algorithms for SHM applications. …”
Get full text
Get full text
Thesis
