Search Results - (( java application mining algorithm ) OR ( changes evaluation window algorithm ))
Search alternatives:
- application mining »
- evaluation window »
- java application »
- mining algorithm »
- window algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The idea of the algorithm was based on creating different contention window ranges between access point and wireless workstations, and changing the technique of increasing the contention window value when the collision happened. …”
Get full text
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
Get full text
Get full text
Get full text
Thesis -
9
Efficient back-off mechanism for multimedia support in IEEE 802.11E
Published 2012“…The performance evaluations are conducted by using NS-2 simulator. The simulation results demonstrate that the proposed algorithm has greatly outperformed the previous mechanisms such as the non-linear dynamic adaptation scheme of the minimum contention window (CWmin HA), dynamic adaptation algorithm of the maximum contention window (CWmax adaptation), Adaptive Enhanced Distributed Coordination Function (AEDCF), Random adaptive MAC parameters scheme RAMPS and the conventional EDCA mechanism. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
A New Pre-Processing Technique For Computational Of Stereo Matching Algorithm
Published 2021“…Based on Middlebury Standard Benchmarking Dataset, the proposed algorithm has 23.35% accuracy for nonocc error and 31.65% accuracy for all error, which yields a better accuracy compared to some works in the evaluation dataset.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
High performance through wall human activity recognition using WiFi
Published 2023“…We also implemented a CSI-based model using Nexmon with an LSTM algorithm with commodity WiFi devices and evaluated it in several environments. …”
Get full text
Get full text
Get full text
Article -
13
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
Get full text
Get full text
Thesis -
14
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
Get full text
Get full text
Article -
15
A hybrid rate control mechanism for forwarding and congestion control in named data network
Published 2020“…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Relationship between deforestation and land surface temperature across an elevation gradient using satellite imagery in Cameron Highlands, Malaysia
Published 2021“…The specific objectives were three folds; (i) to detect Land Use and Land Cover Change (LULCC) between 2009 and 2019 in Cameron Highlands, (ii) to evaluate the relationship between Land Use and Land Cover Change (LULCC) and Land Surface Temperature (LST) using Landsat and MODIS imageries, and (iii) to assess Land Use and Land Cover Changes (LULCC) of different forest types across an altitude gradient. …”
Get full text
Get full text
Thesis -
17
Ensemble learning using multi-objective optimisation for arabic handwritten words
Published 2021“…Multi-Objective Ensemble Oriented (MOEO) formulated to control the classifier topology and provide feedback support for changing the classifiers' topology and weights based on the extension of Non-dominated Sorting Genetic Algorithm (NSGA-II). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Development of a Production Planning and Control Software in Total Productivity Maintenance Environment
Published 2004“…A TPM based software program has been developed to ease the process of production planning and control in TPM environment by executing sequential methodology such as problem identification, literature review, problem formulation, data coliection, company operation review, flow chart system and program algorithm before test run in the company. This program has been created in Window format and encoded using Microsoft Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
19
Adaptive linux-based TCP congestion control algorithm for high-speed networks
Published 2017“…Moreover, the AF-based CCA shows lower sensitivity to the change of buffer size and packet error rate, which increases its efficiency. …”
Get full text
Get full text
Thesis -
20
Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification
Published 2019“…The proposed approach in this work tends to tackle the multiple EEG channels problem by segmenting the EEG signals in the frequency domain based on changing spikes rather than the traditional time based windowing approach. …”
Get full text
Get full text
Article
