Search Results - (( model verification method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- verification method »
- application mining »
- method algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
-
9
-
10
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
11
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The thesis was set to three objectives as follows; to develop a new augmentation algorithm of Simplex method from the existed augmentation studies; to integrate the superiorities of the QSM and BLSA algorithms that can enhance computational performance; to compare the performance of the new augmentation algorithm with the conventional Simplex, QSM and BLSA in reducing iteration number. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Effects of integration on the cost reduction in distribution network design for perishable products
Published 2014“…To solve the integrated model, a memetic algorithm (MA) is developed in this study. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…On analysing the distortion effect by means of numerical computation method, a commercial specialized simulation software Simufact.Welding was used in the development of the numerical model. …”
Get full text
Get full text
Thesis -
17
Verification of volume-of-fluid (VOF) simulation for thin liquid film applications
Published 2023“…This paper describes the application of the built-in Volume-of-Fluid (VOF) model in the commercial Computational Fluid Dynamics (CFD) software FLUENTTM and the verification of its accuracy. …”
Conference paper -
18
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
Get full text
Get full text
Article -
19
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Then, it is tested on the FPGA using the properties of hardware co-simulation method. The system verification is performed by simulating the hardware co-simulation for the metric value of the EXP-BET metric algorithm and compared against the manual calculation.…”
Get full text
Get full text
Thesis -
20
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis
