Search Results - (( java application mining algorithm ) OR ( data integration case algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- data integration »
- integration case »
- case algorithm »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…In each case, the Traveling Salesman Problem-Genetic Algorithm (TSP-GA) algorithm is applied to determine a minimum total distance of RES sites integration. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. …”
Get full text
Get full text
Get full text
Thesis -
10
Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm
Published 2024“…Weather data, including wind, solar, fuel, and battery status, is integrated into the BGD algorithm for optimizing ON and OFF schedules. …”
Conference Paper -
11
Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids
Published 2009“…Although the IDLT model is proposed for single source, it has been applied in the case of multiple sources. The third stage integrates the proposed DLT based models with GA algorithm to solve the time consuming problem. …”
Get full text
Get full text
Thesis -
12
Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik
Published 2018“…This research also emphasizes the development methodology of data analysis. The data gathered involved two major cases studies of data from patients with Thalassemia among children and the patients with dental caries problems. …”
Get full text
Get full text
Thesis -
13
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Data tampering avoidance for food supply chain traceability system using blockchain technology
Published 2019“…The results showed that the algorithm was able to preserve data integrity up to 100% accuracy.…”
Get full text
Get full text
Thesis -
15
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Data integrity must be ensured before and after the data transmission. …”
Get full text
Get full text
Thesis -
16
Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case)
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
19
-
20
Adopting genetic algorithm to enhance state-sensitivity partitioning
Published 2015“…The objective of SSP is to avoid exhaustive testing of the entire data states of a module. In SSP, test cases are represented in the form of sequence of events. …”
Get full text
Get full text
Conference or Workshop Item
