Search Results - (( programming does detection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- programming does »
- java application »
- mining algorithm »
- does detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
-
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Obstacles Avoidance Mobile Robot
Published 2007“…Ultrasonic sensors will be the main device to collect all the information from the surrounding. The algorithm simply works by driving the robot forward until it detects an obstacle; once it does, it backs up, turns away and resumes moving forward. …”
Get full text
Get full text
Final Year Project -
11
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A review of classification techniques for electromyography signals
Published 2023“…Normally, during rest our muscle tissue does not produce electrical signals. Machine Learning (ML) is an area of Artificial Intelligent (AI) with a concept that a computer program can learn and familiarize to new data without human intervention. …”
Get full text
Get full text
Get full text
Article -
14
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
15
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
16
-
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
Identification and characterization of a novel Epstein-barr virus-encoded circular RNA from LMP-2 Gene / Tan Ke En
Published 2022“…Characterization of circLMP-2_e5 demonstrated that it was readily detected in a panel of EBV-positive cell lines modelling different latency programs, ranging from lower expression in NPC cells to higher expression in B cells and was localized to both cytoplasm and nucleus. …”
Get full text
Get full text
Get full text
Thesis -
19
