Search Results - (( java application mining algorithm ) OR ( basic integration modified algorithm ))
Search alternatives:
- integration modified »
- application mining »
- basic integration »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…We demonstrate our framework; the integration of enhanced Jump Point Search algorithm with modified Bresenham for heuristic computation in virtual grid-based environment. …”
Get full text
Get full text
Get full text
Thesis -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR
Published 2007“…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Implementation of UPFC model into fast decoupled load flow
Published 2004“…By using this approach, the basic Fast decoupled algorithm can be added with functionality to analyze UPFC without the need to modify the whole algorithm, which will require minimum modification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Utilizing of flower pollination algorithm for brushless DC motor speed controller
Published 2020“…If the PID controller is modified with a new algorithm, better results can be obtained from the BLDC motor. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The NAIA controller is designed by integrating a modified nonlinear function to the base AIA controller. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. …”
Get full text
Get full text
Student Project -
14
Improving modified cocomo ii artificial neural network using hyperbolic tangent activation function
Published 2017“…The proposed activation function has been trained and tested using two different architectures of NN which are basic COCOMO II-NN and modified COCOMO II-NN that uses COCOMO II NASA93 dataset. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…Also, a hash integrity comparison was performed on all files. By putting a very few files (12) in such large dataset, we made it more difficult to detect but the tool detected all modified files, added files, deleted files with modified file header, files with changed extension and also files with failed hash verification – this represented a 100% detection rate. …”
Get full text
Get full text
Thesis -
16
Integrated artificial intelligence-based classification approach for prediction of acute coronary syndrome
Published 2014“…In the development of the “hybrid AI-based” classification models, the proposed model (K1-K2- NN), was basically introduced through combining AI approaches of modified K-NN, genetic algorithm (GA), Fisher’s discriminant ratio (FDR) and class separability criteria (CSC). …”
Get full text
Get full text
Get full text
Thesis
