Search Results - (( java implementation mining algorithm ) OR ( parameter estimation security algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- estimation security »
- mining algorithm »
- parameter »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
ADAPTIVE LINEAR ALGORITHMS FOR POWER SYSTEM FUNDAMENTAL AND HARMONIC ESTIMATION
Published 2015“…Frequency and harmonics are two essential parameters for power system functions such as power quality monitoring, power system protection, economic dispatch and security assessment. …”
Get full text
Get full text
Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Power System State Estimation In Large-Scale Networks
Published 2010“…The developed program is suitable either to estimate the UPFC controller parameters or to estimate these parameter values in order to achieve the given control specifications in addition to the power system state variables.…”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
10
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The research starts with developing the hybrid deep learning model consisting of DNN and a K-Means Clustering Algorithm. Then, the developed algorithm is implemented to estimate the parameters of the Lorenz system. …”
Get full text
Get full text
Thesis -
11
Identifying high influence parameters using Genetic Algorithm (GA) chromosomes for water consumption
Published 2021“…This work utilized Genetic Algorithm (GA) to optimize the coefficient of micro-components of water consumption (CMWC) values to determine high influential household routine parameters. …”
Get full text
Get full text
Get full text
Article -
12
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014“…In this paper, a hybrid method combined with maximum likelihood (ML) and genetic algorithm (GA) are proposed to determine the instantaneous position of the moving source by estimating the position and velocity based on hyperbolic techniques (TDOA and FDOA). …”
Get full text
Get full text
Conference or Workshop Item -
13
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…We also evaluate the memory cost for system parameters and accumulators. Finally, we study the provable security element for both cryptosystems. …”
Get full text
Get full text
Thesis -
14
Estimation of Examinees' Ability Through Computer Adaptive Testing Based on Neural Network Approach
Published 2010“…In the second phase, estimation of examinees’ ability has been obtained with multi-layer feed forward neural network with back propagation algorithm. …”
Get full text
Get full text
Thesis -
15
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
Get full text
Get full text
Thesis -
16
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Effects of Ambient Tropospheric Ozone on Mr-219 Rice in the Muda Irrigation Scheme Area
Published 2005“…This study finding is undeniable imperative and it bestows the first algorithmic yield-loss model of crop to ozone in this country, ever.…”
Get full text
Get full text
Thesis
