Search Results - (( program point based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- program point »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
A Program To Generalize Contour Lines
Published 1994“…A complete computer program based on the developed algorithm is presented.…”
Get full text
Get full text
Article -
8
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
9
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This thesis presents the Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission system. …”
Get full text
Get full text
Thesis -
10
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
11
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
An alternative method to solve combined economic emission dispatch problems using flower pollination algorithm
Published 2016“…Flower Pollination Algorithm (FPA) is a new biologically inspired meta-heuristic optimization technique based the pollination process of flowers. …”
Get full text
Get full text
Thesis -
14
A review of slicing techniques in software engineering
Published 2015“…Program slice is the part of program that may take the program off the path of the desired output at some point of its execution. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
16
A combined filter line search and trust region method for nonlinear programming
Published 2006“…In the event when the step size has reached a minimum threshold such that the trial iterate is rejected by the filter, the algorithm temporarily exits to a trust region based algorithm to generate iterates that approach the feasible region and also acceptable to the filter. …”
Get full text
Article -
17
Peripheral Interface Controller (PIC) Based Maximum Power Point Tracking (MPPT) Algorithm For Photovoltaic (PV) DC To DC Boost Converter
Published 2016“…Every photovoltaic (PV) array has an optimum operating point, called the maximum power point, which varies depending on PV temperature, the insolation level and array voltage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012“…Through this algorithm, each access point (AP) that adjacent will be given different channels based on colours available. …”
Get full text
Get full text
Conference or Workshop Item -
19
One-step block methods for solving ordinary and delay differential equations
Published 2011“…The algorithm which is based on the predictor-corrector scheme of Adams type was then extended from two up to six point one step block method. …”
Get full text
Get full text
Thesis -
20
Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias
Published 2007“…This problem can be compare by using both method of power flow, which remains well condition at the saddle node bifurcation point due to the convergence of load flow. The method of power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis
