Search Results - (( shape identification method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- identification method »
- shape identification »
- application mining »
- method algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Human identification at a distance using body shape information
Published 2013“…This paper presents an intelligent system approach for human identification at a distance using human body shape information. …”
Get full text
Get full text
Get full text
Article -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
-
10
An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity
Published 2018“…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
Get full text
Get full text
Proceeding -
11
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…The algorithm was developed based on three theories of personality traits, namely Myers-Briggs Type Indicator (MBTI), Shape, and Multiple Intelligence (MI). …”
Get full text
Get full text
Get full text
Thesis -
12
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…The AR algorithm characterizes the shape of the stress wave signals by AR coefficients and clustered using ‘centroid’ linkages. …”
Get full text
Get full text
Get full text
Article -
13
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
Get full text
Get full text
Thesis -
14
Experimental analysis of racing car chassis for Modal Identification / M. N. Aizat Zainal ...[et al.]
Published 2018“…Results from both FDD and EMA are validated and compared to ensure that FDD result can be further used in OMA methods of analysis. Only two out of four identification algorithms in parametric OMA techniques will be applied, namely Enhanced Frequency Domain Decomposition (EFDD) and Canonical Variant Analysis of Covariance-driven Stochastic Subspace Identification (SSI-CVA) methods. …”
Get full text
Get full text
Article -
15
-
16
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
Get full text
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
18
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…This research has produced filtered back concentration profiles of each flow regimes owing to the technique of neural network method of flow regime identification.…”
Get full text
Get full text
Thesis -
19
An approach to enhance the structural operational deflection shape under random ambient excitation through mode shape expansion / Muhamad Azhan Anuar
Published 2021“…(iii) An expansion approach was applied by a linear combination of both OMA and FE mode shapes data using the modified LCP method (iv) A new algorithm that includes the selection matrix and rotation matrix were used to obtain the estimated experimental mode shape at higher DOFs. …”
Get full text
Get full text
Thesis -
20
Comparison of fully automated and semi-automated methods for species identification
Published 2018“…In order to assist taxonomists, many methods and algorithms have been proposed to develop semi-automated and fully automated systems for species identification. …”
Get full text
Get full text
Article
