Search Results - (( structures deviation detection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- structures deviation »
- deviation detection »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We employ conceptual graphs interchange format (CGIF) – a knowledge representation formalism to capture the structure and semantics of sentences. We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. …”
Get full text
Get full text
Get full text
Article -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Development of a computer vision-based technique for analysis of hand therapy exercise
Published 2018“…For this purpose, the ROM exercise was developed by using the hand detection and tracking, fingertips detection, skeleton joints detection algorithms and joint angle measurement algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Examining the heterogeneous regimes of stock market identified with two variants of B-B algorithms that differ in rigidness of specification
Published 2017“…The results show that the Candelon et al. (2008) B-B algorithm which is less rigid between the two, detects more frequent switching of regimes, has lower standard deviation and yields higher values of cumulative return and loss. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach
Published 2018“…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
Get full text
Get full text
Final Year Project -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach
Published 2018“…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
Get full text
Get full text
Final Year Project -
14
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…The first component is a reactive max-min ant system algorithm for recording the neighborhood structures. …”
Get full text
Get full text
Get full text
Thesis -
15
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…The results showed that the proposed algorithm could provide an efficient structure and procedure by reducing the processing time and minimizing human error. …”
Get full text
Get full text
Get full text
Article -
16
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…The results showed that the proposed algorithm could provide an efficient structure and procedure by reducing the processing time and minimizing human error. …”
Get full text
Get full text
Get full text
Article -
17
Automated Negative Lightning Return Strokes Characterization Using Brute-Force Search Algorithm
Published 2024Get full text
journal::journal article -
18
Permutation entropy based full-reference image quality qssessment
Published 2019“…Motivated by the need of appropriate objective models, we propose a novel objective IQA algorithm, namely, Permutation Entropy Deviation Index (PEDI), based on the working principle of permutation entropy (PE). …”
Get full text
Get full text
Conference or Workshop Item -
19
Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection
Published 2019“…The palm vascular detection processing was also executed on the self-developed dataset constructed earlier for validation. …”
Get full text
Get full text
Thesis -
20
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…Furthermore, the proposed method outperforms MVO-ANN, FC-ANN, DN, CSO-ANFIS, single ANFIS, and single ResNet in terms of detection rate, F1-score, and recall rate. Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
Get full text
Get full text
Get full text
Get full text
Thesis
