Search Results - (( java applications usage algorithm ) OR ( parameter identification mining algorithm ))
Search alternatives:
- parameter identification »
- identification mining »
- applications usage »
- java applications »
- mining algorithm »
- usage algorithm »
-
1
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
2
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
3
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…The experimental results revealed that the modified πRKM algorithm performed better than the previous version in terms of the correct identification of overlapping objects between positive clusters. …”
Get full text
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Identification of debris flow initiation zones using topographic model and airborne laser scanning data
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Single input fuzzy logic controller for yaw control of underwater remotely operated crawler
Published 2018“…The algorithm is verified in MATLAB/Simulink software. …”
Get full text
Get full text
Get full text
Get full text
Thesis
