Search Results - (( java application mining algorithm ) OR ( using active process algorithm ))
Search alternatives:
- application mining »
- process algorithm »
- java application »
- mining algorithm »
- active process »
- using active »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…The main difference between these two data sets is measured in terms of the similarities quantify of bioactivities between active compounds. The results are compared with Ward’s algorithm in terms of proportion actives percentage in active clusters are. …”
Get full text
Get full text
Get full text
Thesis -
9
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
11
Image Analysis of Sludge Aggregates in Palm Oil Mill Effluent (POME)
Published 2015“…Palm oil mill effluent (POME) is a highly polluting material and activated sludge system is now commonly used for the process of purification of the wastewater. …”
Get full text
Get full text
Final Year Project -
12
A Hybrid Active Contour and Artificial Bee Colony Algorithm for Segmenting Mixed-Meal Food Images (S/O: 13239)
Published 2020“…Active contour (snake) segmentation is extensively used in image processing and analysis applications particularly for identifying object boundaries. …”
Get full text
Get full text
Monograph -
13
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…A new algorithm has been developed to detect the presence of muscle activities in weak and noisy sEMG signals. …”
Get full text
Get full text
Conference or Workshop Item -
14
Multivariable PID controller design tuning using bat algorithm for activated sludge process
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Enhancement of stemming process for malay illicit web content
Published 2012“…There are six (6) phases included in web filtering process. One of them is pre-processing phase. In this phase, there are three main activities included; HTML parsing, stemming, and stopping. …”
Get full text
Get full text
Thesis -
16
-
17
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…The abnormal PPG pattern detection using rule-based algorithm has produced accuracy of 87.30% in training process and 87.18% in testing process with coverage of rule for training and testing, 89.26% and 87.33%. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Active power optimization based on non adaptive immune algorithm: article
Published 2010“…This paper presents a study of active power optimization based on non adaptive immune algorithm (NAIA) in power systems. …”
Get full text
Get full text
Article -
19
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023“…Different methods are used to control the active power filters. The reference current to be detected from the load current and processed by the active power filter controller is obtained from two different control algorithms, namely the Instantaneous Reactive Power Theory (PQ Theory) and Synchronous Reference Frame Theory (SRF Theory). …”
Conference paper -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis
