Search Results - (( java implementation mining algorithm ) OR ( using active process algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- process algorithm »
- mining algorithm »
- active process »
- using active »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…The main difference between these two data sets is measured in terms of the similarities quantify of bioactivities between active compounds. The results are compared with Ward’s algorithm in terms of proportion actives percentage in active clusters are. …”
Get full text
Get full text
Get full text
Thesis -
9
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
11
Image Analysis of Sludge Aggregates in Palm Oil Mill Effluent (POME)
Published 2015“…Palm oil mill effluent (POME) is a highly polluting material and activated sludge system is now commonly used for the process of purification of the wastewater. …”
Get full text
Get full text
Final Year Project -
12
A Hybrid Active Contour and Artificial Bee Colony Algorithm for Segmenting Mixed-Meal Food Images (S/O: 13239)
Published 2020“…Active contour (snake) segmentation is extensively used in image processing and analysis applications particularly for identifying object boundaries. …”
Get full text
Get full text
Monograph -
13
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…A new algorithm has been developed to detect the presence of muscle activities in weak and noisy sEMG signals. …”
Get full text
Get full text
Conference or Workshop Item -
14
Multivariable PID controller design tuning using bat algorithm for activated sludge process
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Enhancement of stemming process for malay illicit web content
Published 2012“…There are six (6) phases included in web filtering process. One of them is pre-processing phase. In this phase, there are three main activities included; HTML parsing, stemming, and stopping. …”
Get full text
Get full text
Thesis -
16
-
17
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…The abnormal PPG pattern detection using rule-based algorithm has produced accuracy of 87.30% in training process and 87.18% in testing process with coverage of rule for training and testing, 89.26% and 87.33%. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Active power optimization based on non adaptive immune algorithm: article
Published 2010“…This paper presents a study of active power optimization based on non adaptive immune algorithm (NAIA) in power systems. …”
Get full text
Get full text
Article -
19
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023“…Different methods are used to control the active power filters. The reference current to be detected from the load current and processed by the active power filter controller is obtained from two different control algorithms, namely the Instantaneous Reactive Power Theory (PQ Theory) and Synchronous Reference Frame Theory (SRF Theory). …”
Conference paper -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis
