Search Results - (( parallel detection device algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- parallel detection »
- application mining »
- device algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
4
Distributed parallel deep learning with a hybrid backpropagation-particle swarm optimization for community detection in large complex networks
Published 2022“…In this paper, a parallel deep learning-based community detection method in large complex networks (CNs) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
OPTIMIZED ARCHITECTURE DESIGN AND IMPLEMENTATION OF OBJECT TRACKING ALGORITHM ON FPGA
Published 2013“…The Adaptive Hybrid Difference algorithm (AHD), which is used to detect the moving objects, was chosen to be implemented on FPGA due to its computation ability and efficiency with regard to hardware implementation. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Face recognition using artificial neural networks in parallel architecture
Published 2023“…There, we consider a parallel training approach for backpropagation algorithm for face recognition. …”
Article -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
13
Implementation and Analysis of Biological Synaptogenesis Technique on Nodes and Interconnects for NoC Fault Tolerance
Published 2016“…This technique is robust as it makes the NoC fault-tolerant and able to reconfigure upon detection of router or interconnect faults. In this paper, two techniques based on synaptogensis algorithm have been critically analyzed. …”
Get full text
Get full text
Article -
14
Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN)
Published 2011“…A back-propagation (BP) network with Levenberg-Marquardt training algorithm has been used for the detection of gesture. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
16
A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction
Published 2013“…The proposed AI adopted is an artificial neural network (ANN) responsible to detect current harmonics for the active power filtering process. …”
Get full text
Get full text
Conference or Workshop Item -
17
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. Afterwards, an SoC for real-time video analytics is realized on Zynq using Harris corner detection algorithm. …”
Get full text
Get full text
Thesis -
18
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…Therefore, the actions against security incidents increased since network-connected devices. Log files are generated at every level of the computing infrastructure and represent a valuable source of information in detecting attacks. …”
Get full text
Get full text
Get full text
Article -
19
Quantitative comparison between low energy high resolution (LEHR) and medium energy general purpose (MEGP) collimator on nema spect imaging
Published 2024“…Nuclear medicine imaging uses four primary collimator types: parallel-hole, diverging-hole, converging-hole, and pinhole. …”
Get full text
Get full text
Thesis -
20
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis
