Search Results - (( java application mining algorithm ) OR ( basic relation _ algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The computational results and comparison with other related tools are presented to show the effectiveness of the proposed algorithm and tools.…”
Get full text
Get full text
Get full text
Article -
9
Modification of the ant colony optimization algorithm for solving multi-agent task allocation problem in agricultural application
Published 2024“…The performance of the basic ACO algorithm for solving task allocation is improved by modifying the efficiency factor. …”
Get full text
Get full text
Get full text
Article -
10
XRecursive, An Efficient Relational Method to Store XML Data
Published 2011Get full text
Get full text
Get full text
Article -
11
Interval-valued fuzzy soft topology and its applications in group decision-making problems
Published 2022“…In the third phase, we introduce two preorder relations and two equivalence relations over X for the two topological structures tl e;b and tu e;a: We also present some properties of these preorder and equivalence relations, and links between them are studied. …”
Get full text
Get full text
Thesis -
12
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Genetic Algorithms are very efficient at exploring the entire search space; however, they are relatively poor at finding the precise local optimal solution in the region at which the algorithm converges. …”
Get full text
Get full text
Get full text
Article -
13
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The usage will allowthem to access the system that manipulates this algorithm. The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
Get full text
Get full text
Final Year Project -
14
CSC510: Discrete Structures / College of Computing, Informatics and Media
Published 2022“…This course discusses the basic tools of mathematics and logic to provide the logical foundation underlying the design and analysis of algorithms for problems solving in computer science. …”
Get full text
Get full text
Get full text
Teaching Resource -
15
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Basically, estimating immunity of lower bounds in the substitution-permutation network (SPN) block ciphers structure against RDC attack is essential for providing a secure block cipher algorithm. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…The project used Back-propagation Neural Network for the algorithm to classified images. Images that capture using digital camera will perform through the algorithm to classified images. …”
Get full text
Get full text
Thesis -
18
Particle Swarm Optimization algorithm for facial emotion detection
Published 2010Get full text
Working Paper -
19
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005Get full text
Get full text
Final Year Project -
20
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
Get full text
Get full text
Conference or Workshop Item
