Search Results - (( pattern design process algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- process algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…There are 6 main designs that the algorithms proposed namely the Orthogonal-Diamond Search Algorithm with Small Diamond Search Pattern (ODS-SDSP), the Orthogonal-Diamond Search Algorithm with Large Diamond Search Pattern (ODS-LDSP), the Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (DOS-SDSP), the Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (DOS-LDSP), the Modified Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (MDOS-SDSP), and the Modified Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (MDOS-LDSP). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
9
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…Motif Discovery (MD) is the process of identifying meaningful patterns in DNA, RNA, or protein sequences. …”
Get full text
Get full text
Book Section -
10
Developing triad design algorithms based on compatible factorization
Published 2011“…These processes have helped us develop algorithm for triad design, the objective of this study.A new technique for triad design algorithm, known as Interval Generation Method was employed to construct TD(6n + 1) and TD(6n + 5).This method depends on analyzing the pattern of triples in the design to build starters.We begin by producing starters from Interval Generation Method as the initial block to begin with.Then the algorithm begins by cycling modular v from the initial block and finishes when the process approaches the initial block.The algorithms for TD(6n+1) and TD(6n+5) are presented in Chapter 4 and 5, respectively.As the entire study depends mainly on TD(v) algorithms, new and remarkable theorems and lemmas for TD(v) development are presented and proved.…”
Get full text
Get full text
Get full text
Monograph -
11
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring patterns / Wan Abdul Qayyum Moh Salleh
Published 2013“…Synopsys tools are used for analysis the project in ASIC design. VCS for verification the design for further process in ASIC design tools are used. …”
Get full text
Get full text
Student Project -
12
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring pattern: article / Wan Abdul Qayyum Moh Salleh and A.K. Halim
Published 2013“…Synopsys tools are used for analysis the project in ASIC design. VCS for verification the design for further process in ASIC design tools are used. …”
Get full text
Get full text
Article -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
15
Optimizing Central Pattern Generators (CPG) Controller For One Legged Hopping Robot By Using Genetic Algorithm (GA)
Published 2018“…This paper presents the optimization process of Central Pattern Generator (CPG) controller for one legged hopping robot by using Genetic Algorithm (GA).To control the one legged hopping robot,a CPG controller is designed and integrated with a conventional ProportionalIntegral (PI) controller.Conventionally,the CPG parameters are tuned manually.But by using this method,the parameters produced are not exactly the optimum parameters for the CPG. …”
Get full text
Get full text
Get full text
Article -
16
Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks
Published 2014“…Pattern classification is one of the major components for the design and development of a computerized pattern recognition system. …”
Get full text
Get full text
Thesis -
17
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Motif Discovery (MD) is the process of identifying meaningful patterns in DNA, RNA, or protein sequences. …”
Get full text
Get full text
Thesis -
18
Object with symmetrical pattern recognition with dynamic size filter
Published 2011“…This system is design for on-event processes and suitable for indoor environment applications with low time frame rate camera. …”
Get full text
Get full text
Conference or Workshop Item -
19
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…The algorithm is designed in hardware using hardware description language for hardware realization. …”
Get full text
Get full text
Get full text
Thesis -
20
Weighted Watson-crick automata and applications in halal authentication
Published 2016“…We also construct formal models for food authentication processes and develop algorithms for the identification of non halal patterns in DNA molecules. …”
Get full text
Get full text
Monograph
