Search Results - (( java selection mining algorithm ) OR ( program implementation connection algorithm ))
Search alternatives:
- implementation connection »
- program implementation »
- connection algorithm »
- selection mining »
- mining algorithm »
- java selection »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Sequential pattern mining is a new branch of data, mining science that solves inter-transaction pattern mining problems. …”
Get full text
Thesis -
2
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Sequential pattern mining is a new branch of data, mining science that solves inter-transaction pattern mining problems. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior
Published 2023“…The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm and another biological inspired algorithm. …”
Article -
7
Control algorithm for two-tank system using multiparametric programming
Published 2023“…In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…In order to achieve this objective, each node must be connected in its shortest way as possible. We start our algorithm by designing shortest path algorithm based on Dijkstra's method. …”
Get full text
Get full text
Get full text
Article -
9
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
10
-
11
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
12
Design And Development Of Gas Argon Purging System
Published 2006“…AMPL is used in two ways of connection of its programming, first is Data Base, and second is PC element. …”
Get full text
Get full text
Monograph -
13
Modular motor driver with torque control for gripping mechanism
Published 2023“…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
14
Moving detection using cellular neural network (CNN)
Published 2008“…The templates are programmed in MATLAB. There are few rules in Cellular Neural Network that has to be implemented when programming the templates, such as the state equation, output equation, boundary condition and also the initial value. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
Get full text
Get full text
Thesis -
16
-
17
Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems
Published 2005“…To facilitate the implementation of these algorithms, a semi-automated computational tool using Matlab® programming facilities is developed. …”
Get full text
Get full text
Thesis -
18
Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter
Published 2014“…For hardware implementation, the proposed adaptive P&O-fuzzy control MPPT was programmed in TMS320F28335 digital signal processing board. …”
Get full text
Get full text
Article -
19
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…For hardware implementation, laboratory prototype has been developed and the proposed algorithm was programmed in TMS320F28335 DSP board. …”
Get full text
Get full text
Article -
20
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis
