Search Results - (( frames validation study algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model by Ouwabunmi, Babalola AbdulHafeez

    Published 2025
    “…While the focus was on comparing standalone and hybrid models, the study identifies opportunities for future benchmarking against external tools to further validate its contributions. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…This research produced a mechanism to deal with missing data in Hadith database, 999 Hadiths from Sahih Al-Bukhari, Jami'u Al-Termithi and Selseelt AlaHadith Aldae'ifah w' Almadu'h were framed the sample of this study, the attributes of the hadith database were gained according to the validate methods of Hadith science, the experiment applied C4.5 algorithm to extract the rules of classification. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Analytical model for partially prestressed concrete beam-column elements by Esfahani, Milad Hafezolghorani

    Published 2017
    “…Besides, based on an extensive review of the literature, there is less information available about the possibility of identifying the damage in partially prestressed concrete beams and frame structures during earthquake excitation. Hence, in this study a new analytical model for PPC frame elements subjected to static and dynamic loads is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Novel Architecture for Transactive Energy Management Systems with Various Market Clearing Strategies by Arun, S.L., Bingi, K., Vijaya Priya, R., Jacob Raglend, I., Hanumantha Rao, B.

    Published 2023
    “…The proposed framework is validated with different case studies considering ten residential participants in a locality. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…This scheme performs two main operations which is the data-frame interleaving and intra-frame data encryption using bit swapping. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels by Mfarej, Sumaya Dhari Awad

    Published 2021
    “…Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
    Get full text
    Get full text
    Thesis
  17. 17

    STRUCTRAL BEHA VIORE OF REINFORCED CONCRETE BEAMS STRENGTHED FOR SHEAR USING CFRP LAMINATES SUBJECTED TO CYCLIC LOADING by ABDEL WAHAB, LOUA Y MAHMOUD

    Published 2010
    “…The results from the analytical model were compared with corresponding experimental ones in order to confirm the validity of the analytical algorithm. The comparison between the analytical results and the published results gave a good agreement which indicates that experimental methodology proved to be appropriate and valid and that the analytical algorithm is quite efficient tool to study the structural behaviour of such element under cyclic loading as well as monotonic loading. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An automated high-accuracy detection scheme for myocardial ischemia based on multi-lead long-interval ECG and Choi-Williams time-frequency analysis incorporating a multi-class SVM... by Hussein, Ahmed Faeq, Hashim, Shaiful Jahari, Rokhani, Fakhrul Zaman, Wan Adnan, Wan Azizun

    Published 2021
    “…The high degree of classification accuracy for the different and unknown data sources used in this study reflects the flexibility, validity, and reliability of this proposed scheme. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Simulation and experiments are performed to validate the design concept of LTDMA scheme and evaluate the sensor node's throughput, power consumption and the efficiency of the proposed embedded algorithms for SHM applications. …”
    Get full text
    Get full text
    Thesis