Search Results - (( learning implementation generation algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- implementation generation »
- generation algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Multi-Robot Learning with Bat Algorithm With Mutation (Bam)
Published 2022Get full text
Get full text
Undergraduates Project Papers -
9
An application of teaching–learning-based optimization for solving the optimal power flow problem with stochastic wind and solar power generators
Published 2023“…This paper proposes the implementation of metaheuristic algorithm namely, teaching–learning-based optimization (TLBO) algorithm to solve optimal power flow (OPF) problem. …”
Get full text
Get full text
Get full text
Article -
10
Functional link neural network with modified bee-firefly learning algorithm for classification task
Published 2016“…This work proposed the implementation of modified Artificial Bee Colony with Firefly algorithm for training the FLNN network to overcome the drawback of BP-learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Potential of Metal Artifact Reduction (MAR) and Deep Learning-based Reconstruction (DLR) algorithms integration in CT Metal Artifact Correction: a review
Published 2024“…However, challenges in implementation and machine learning model reliability require further exploration. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
A Case Study of Using Long Short-Term Memory (LSTM) Algorithm in Solar Photovoltaic Power Forecasting
Published 2023“…This study implements the deep learning method, long short-term memory (LSTM) models for time series forecasting in solar photovoltaic power generation forecasting. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
Published 2024“…This requires the generator to learn how to generate images from partially damaged data, leading to better representations learned from the data. …”
Get full text
Get full text
Thesis -
14
Automatic email classification system / Phang Siew Ting
Published 2003“…Automatic Email Classification System is an email reader tool that implements machine learning algorithm in email classification, manipulated by a Graphical User Interface. …”
Get full text
Get full text
Thesis -
15
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Decision tree is an important method in data mining to solve the classification problems. There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
Get full text
Get full text
Article -
18
-
19
Unified neural network controller of series active power filter for power quality problems mitigation
Published 2013“…First, Widrow-Hoff algorithm is examined and its constant learning rate is modified by adding an adaptive learning rule to change the learning rate value. …”
Get full text
Get full text
Thesis -
20
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
