Search Results - (( using estimation mining algorithm ) OR ( java application system algorithm ))
Search alternatives:
- estimation mining »
- using estimation »
- mining algorithm »
- java application »
- system algorithm »
-
1
-
2
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…In this study we advance a model for mining of user’s navigation pattern. The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
Get full text
Get full text
Article -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Tree-based contrast subspace mining method
Published 2020“…Those subspaces are termed as contrast subspaces. All existing mining contrast subspace methods (i.e. CSMiner and CSMiner-BPR) use density-based likelihood contrast scoring function to estimate the likelihood of a query object to target class against other class in a subspace. …”
Get full text
Get full text
Get full text
Thesis -
6
Estimating 1-MCP application for Kampuchea guava with data mining technology
Published 2018“…The classification models can then be used for estimating the 1-MCP application fast whenever there are new data available. …”
Get full text
Get full text
Get full text
Article -
7
Machine Learning Regression Approach for Estimating Energy Consumption of Appliances in Smart Home
Published 2024“…This paper attempts to use machine learning algorithms to estimate the energy consumption of appliances in a smart home environment. …”
Conference Paper -
8
An application of IPA approach on the optimization of a mining port stockyard system
Published 2002“…The results show that PARMSR algorithm applying IPA can be used to estimate the optimal cost function in subsystem 1 with a high level of confidence. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023Conference Paper -
11
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
12
-
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
-
15
Using language-based search in mining large software repositories
Published 2011“…The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
17
Using language-based search in mining large software repositories
Published 2011“…The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Article -
18
Datasets Size: Effect on Clustering Results
Published 2013“…In this paper, we proposed a research technique that implements descriptive algorithms on numeric datasets of varied sizes. We modeled each subset of our data using EM clustering algorithm; two different numbers of partitions (k) were estimated and used for each experiment. …”
Get full text
Get full text
Conference or Workshop Item -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis
