Search Results - (( linear equalization based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- equalization »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
6
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
7
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Classification for large number of variables with two imbalanced groups
Published 2020“…Based on the findings, Algorithm 2 outperforms Algorithm 1 in classifying the minority group, while both proposed algorithms perform equally well in classifying the majority group. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The flexibility of a genetic algorithm allows various strategies to be applied to it. …”
Get full text
Get full text
Article -
13
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The flexibility of a genetic algorithm allows various strategies to be applied to it. …”
Get full text
Get full text
Article -
14
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. …”
Get full text
Get full text
Get full text
Thesis -
15
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The flexibility of a genetic algorithm allows various strategies to be applied to it. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
17
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40…”
Get full text
Get full text
Get full text
Article -
18
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
19
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
20
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article
