Search Results - (( pattern making based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- pattern making »
-
1
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…In SWAC technique active user's access transaction pattern is matched with user access transaction pattern discovered from user access history based on mining techniques. …”
Get full text
Get full text
Thesis -
2
Design of a pattern classification system using extreme learning machine
Published 2024text::Final Year Project -
3
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
4
Design of a pattern classification system using extreme learning machine
Published 2023text::Final Year Project -
5
Prime-based method for interactive mining of frequent patterns
Published 2010“…The PC-tree is a well-organized tree structure, which is systematically built based on descendant making introduced in this study. …”
Get full text
Get full text
Thesis -
6
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The pandemic has resulted in unpredictable customers’ purchasing patterns post-pandemic has rendered heuristic-based forecasting large forecast errors, which leads to poor decision-making. …”
Get full text
Get full text
Book Section -
7
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…In this paper, we have divided these algorithms into five major classes and propose a survey for the main class, pattern recognition, which is a famous technique in this manner. …”
Get full text
Get full text
Conference or Workshop Item -
8
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…A neural network based pattern recognition system was implemented and tested on images resembling the parts variations. …”
Get full text
Get full text
Thesis -
9
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Addition of hybrid automata algorithm to run pattern and non-pattern recognition based control methods is an advantage to increase accuracy in differentiating forward stroke or hand return activity. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
-
14
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
Reservoir water release dynamic decision model based on spatial temporal pattern
Published 2016“…The modified Sliding Window algorithm was used to construct the rainfall temporal pattern, while the spatial information was established by simulating the mapped rainfall and reservoir water level pattern. …”
Get full text
Get full text
Get full text
Thesis -
17
Machine learning predictions of stock market pattern using Econophysics approach
Published 2025“…In conclusion, the study of Econophysics principles with Python programming and machine learning algorithms has indicates that the predictive framework is reliable and effective in capturing stock price fluctuations, enhancing decision-making for investors based on data-driven insights.…”
Get full text
Get full text
Book Section -
18
-
19
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
20
