Search Results - (( java application mining algorithm ) OR ( using code tree algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- tree algorithm »
- using code »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…, and that name is chosen because it is like Unix but differs from Unix because it is free and contains no Unix code. Those algorithms were implemented using 300 randomly generated problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac)
Published 2014“…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
Get full text
Get full text
Thesis -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2008“…Some recommended areas to be delved for future work on video compression are distributed video coding, ridgelet transform and dual-tree complex wavelet transform.…”
Get full text
Get full text
Final Year Project -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Optimal generator matrix G
Published 2013“…Maximising the minimum determinant is equivalent to obtaining optimal generator matrix G. Instead of using state diagrams, optimal generator matrix G discussed in this paper is obtained using an improved algorithm which is based on Lisya tree structure. …”
Get full text
Get full text
Article -
13
-
14
Current Steering Digital Analog Converter (DAC) Using Partial Binary Tree Network (PBTN)
Published 2018“…Previous research is able to increase the boundaries of Partial Binary Tree Network (PBTN) to 8-Bits. In this research, DEM algorithm is used, known as Partial Binary Tree Network (PBTN) that been proposed from previous research that aims to push the boundaries of past research from 8-bits to 10-bits. …”
Get full text
Get full text
Monograph -
15
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…Regarding the IME of H.264/AVC, we introduce two low cost bit-serial architectures, which are based on full search (FS) algorithm due to its regularity and coding performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Analysis & design low power multiplier using TSMC 0.18µm CMOS technology
Published 2008“…Low power multipliers are developed through minimizing switching activities of partial product using the radix 4 booth algorithm. Before computation for two input data, the one with a smaller effective dynamic range is processed to generate booth codes, thereby increasing the probability that the partial products become zero. …”
Get full text
Learning Object -
17
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article
