Search Results - (( java application mining algorithm ) OR ( problem implementation max algorithm ))
Search alternatives:
- problem implementation »
- application mining »
- implementation max »
- java application »
- mining algorithm »
- max algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…Many algorithms have been implemented to solve the grid scheduling problem. …”
Get full text
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
6
A quantum-inspired particle swarm optimization approach for environmental/economic power dispatch problem using cubic criterion function
Published 2018“…Quantum-inspired particle swarm optimization is implemented on a 6-unit system to solve many-objective EED problems, and at the same time, to show the effectiveness of QPSO in large systems, it is also implemented in a 26-unit power generation system for ED problem. …”
Get full text
Get full text
Article -
7
A quantum-inspired particle swarm optimization approach for environmental/economic power dispatch problem using cubic criterion function
Published 2018“…Quantum-inspired particle swarm optimization is implemented on a 6-unit system to solve many-objective EED problems, and at the same time, to show the effectiveness of QPSO in large systems, it is also implemented in a 26-unit power generation system for ED problem. …”
Get full text
Get full text
Article -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
Ant colony optimization in dynamic environments
Published 2010“…In order to achieve this objective, six ant algorithms namely Ant System (AS), Ant Colony System (ACS), Best-Worst Ant System (BWAS), Elitist Ant System (EAS), Max-Min Ant System (MMAS) and Rank-Based Ant System (RBAS) were implemented to solve a dynamic optimization problem in the form of the dynamic Traveling Salesman Problem (TSP). …”
Get full text
Get full text
Get full text
Thesis -
12
Vertical Handover Decision Processes for Fourth Generation Heterogeneous Wireless Networks
Published 2013“…The survey revealed that the currently proposed VHD algorithms either lacked a comprehensive consideration of several network parameters or studies’ reporting these problems lacks sufficient detail for implementation.…”
Get full text
Get full text
Get full text
Article -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…Afterwards, the PSCA was implemented and tested in real time based on MCU and software (MATLAB). …”
Get full text
Get full text
Thesis -
15
Weighted subsethood and reasoning based fuzzy time series for moving holiday electricity load demand forecasting
Published 2021“…The WeSuSFTS algorithm uses the min-max operator for fuzzy reasoning and average rule defuzzification which make the process simpler. …”
Get full text
Get full text
Get full text
Thesis -
16
M-Factors Fuzzy Time Series for Forecasting Moving Holiday Electricity Load Demand in Malaysia (S/O 14589)
“…The modified algorithm uses the min-max operator for fuzzy reasoning and peak-point defuzzification which make the process simpler. …”
Get full text
Get full text
Monograph -
17
A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks
Published 2019“…However open problems like effect of pooling operations, batch normalization and dictionary learning in context of ML-CSC framework remain challenging issues especially in implementation scenarios. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018“…One of the solution for the problem is to create an Artificial Intelligent (AI) cart follower. …”
Get full text
Get full text
Monograph -
19
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
Published 2025“…The research progresses through four stages: problem definition, approach design, implementation and evaluation, and simulation. …”
Get full text
Get full text
Get full text
Thesis -
20
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…In this project, the Convolutional Neural Network (CNN) algorithm was implemented using TensorFlow in Python to detect fake face images. …”
Get full text
Get full text
Thesis
