Search Results - (( program scale based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- program scale »
- scale based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Hence, optimization methods are regularly incorporated in the sizing algorithm for such system. This study presents the development of Dolphin Echolocation Algorithm (DEA)-based sizing algorithm for sizing optimization of large-scale GCPV systems. …”
Get full text
Get full text
Thesis -
8
An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints
Published 2015“…Therefore, metaheuristic method based genetic algorithm has been developed to obtain feasible and optimal solution with less computation time. …”
Get full text
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
11
A combined filter line search and trust region method for nonlinear programming
Published 2006“…In the event when the step size has reached a minimum threshold such that the trial iterate is rejected by the filter, the algorithm temporarily exits to a trust region based algorithm to generate iterates that approach the feasible region and also acceptable to the filter. …”
Get full text
Article -
12
-
13
Real-time implementation of H∞ controller for UAV helicopter using MATLAB-based embedded programming approach
Published 2015“…The design and deployment of an H∞ based flight control algorithm onto an embedded target is presented for a small scale unmanned helicopter system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Dynamic Economic Dispatch For Large Scale Power Systems: A Lagrangian Relaxation Approach
Published 1991“…The dynamic multi-period economic dispatch problem for large-scale power systems is modelled as a linear programming problem. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019Get full text
Get full text
Thesis -
18
-
19
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
20
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Future development can be carried out by creating a database based on the user’s standard of measure and accessing it whenever the user starts the program.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
