Search Results - (( java application mining algorithm ) OR ( set estimation path algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- estimation path »
- set estimation »
- path algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…The estimated CVDs path model can be implemented as a disease delay strategy in clinical settings. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion
Published 2020“…The path generation algorithm was fully derived within the local maps and tested with a WMR platform in real-time.…”
Get full text
Get full text
Get full text
Article -
9
Position estimation error performance model for a minimum configuration 3-D multilateration
Published 2018“…A multilateration system estimates the position of emitter using time difference of arrival (TDOA) measurements with a lateration algorithm. …”
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
-
12
-
13
Reconfigurable Stewart Platform for Spiral Contours
Published 2011“…The results obtained are to be validated for singularity-free path planning and attempt has to be made to estimate the computational efficiency of the algorithm. …”
Get full text
Get full text
Get full text
Citation Index Journal -
14
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. …”
Get full text
Get full text
Get full text
Thesis -
15
An adaptive predictive fuzzy logic for the altitude control of a micro-satellite
Published 2010“…The adaptive portion of FLC compensates the effect of unknown variations of parameters in the satellite system by using an adaptable gain is connected in the forward path of the FLC. The response of the satellite is compared with that of a known reference model and an adaptive algorithm, derived on the basis of deviation in the responses, updates the adaptive gain. …”
Get full text
Article -
16
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…The predictor is a one step-ahead predictor which estimates the required control at the next sampling time and applies to the system at current sampling time. …”
Get full text
Thesis -
17
Image orientation watermarking technique for copyright protection
Published 2016“…Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis -
18
Design and implementation of double rotor switched reluctance motor using magnetic circuit analysis
Published 2013“…The algorithm to derive the magnetic characteristics of the machine is presented. …”
Get full text
Get full text
Thesis -
19
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The land use/cover classes were derived from interpreted information of Landsat TM imagery using the combined object-oriented segmentation - fuzzy logic algorithm. The DEM of 90m resolution, used to calculate slopes that generated runoffs, was derived from radar data sets (C-band) of the Shuttle Radar Topography Mission (SRTM) using the interferometric approach. …”
Get full text
Get full text
Thesis
