Search Results - (( simulation activation detection algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- simulation activation »
- implementation mining »
- activation detection »
- java implementation »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Web Camera Application For Motion Detection
Published 2003“…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
9
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
10
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023“…The system is modeled and simulated using MATLAB/Simulink simulation package with a shunt active power filter to compensate for the harmonics current injected by the loads. …”
Conference paper -
11
Broken Conductor Detection on Power Distribution Feeder
Published 2013“…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
12
Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms
Published 2024“…This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. …”
Article -
13
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Novel voice activity detection based on cepstrum moments
Published 2010“…Statistical methods for voice activity detection (VAD) have shown impressive performance especially with respect to their ability to be tuned parametrically and adoptability with deferent environments. …”
Get full text
Get full text
Conference or Workshop Item -
15
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
-
17
Combination of GREEN and SHRed AQM for short-lived traffic
Published 2008“…To evaluate the performance of new algorithm, network simulation has been done using NS-2 simulation.This study provides a series of NS-2 experiments to investigate the behavior of new algorithm.The results show improvement on short-lived traffic.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model
Published 2013“…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
Get full text
Get full text
Get full text
Article -
19
Botnet detection using automated script / Norfathin Rosli
Published 2020“…Nowadays, as we know the virus or malware spread can be so fast and usually hard to detect. This simulation is to detect the Botnet presence and identifying its behaviour. …”
Get full text
Get full text
Thesis -
20
Embedded wearable EEG seizure detection in ambulatory state
Published 2014“…The wearable devices allow the user to continue daily activities while being monitored for seizure activities. …”
Get full text
Get full text
Article
