Search Results - (( pre processing force algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- processing force »
- java application »
- mining algorithm »
- force algorithm »
- pre processing »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Therefore, output response from the measurement requires a filtering process to suppress the response from operating forces and retain only the response from the artificially induced force. …”
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
Get full text
Get full text
Get full text
Thesis -
10
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The industrial datasets are pre-processed, profiled and the abnormality is analyzed with DPI. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…It overcomes the cost of capturing and pre-processing genuine crowd datasets. Famous simulation models include agent-based crowd guiding. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Camera geometry determination based on circular's shape for peg-in-hole task
Published 2019“…The peg-in-hole task is widely used in manufacturing process by using vision system and sensors. However, it requires complex algorithm and high Degree of Freedom (DOF) mechanism with fine movement. …”
Get full text
Get full text
Thesis -
13
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…The multilayer shell and beam elements are available in the element library of this finite element program.Both above finite element codes are equipped with pre, post processing and animation graphic facilities. …”
Get full text
Get full text
Thesis
