Search Results - (( using estimation mining algorithm ) OR ( java location based algorithm ))
Search alternatives:
- estimation mining »
- using estimation »
- mining algorithm »
- java »
-
1
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…In this study we advance a model for mining of user’s navigation pattern. The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
Get full text
Get full text
Article -
2
Tree-based contrast subspace mining method
Published 2020“…Those subspaces are termed as contrast subspaces. All existing mining contrast subspace methods (i.e. CSMiner and CSMiner-BPR) use density-based likelihood contrast scoring function to estimate the likelihood of a query object to target class against other class in a subspace. …”
Get full text
Get full text
Get full text
Thesis -
3
Estimating 1-MCP application for Kampuchea guava with data mining technology
Published 2018“…The classification models can then be used for estimating the 1-MCP application fast whenever there are new data available. …”
Get full text
Get full text
Get full text
Article -
4
Machine Learning Regression Approach for Estimating Energy Consumption of Appliances in Smart Home
Published 2024“…This paper attempts to use machine learning algorithms to estimate the energy consumption of appliances in a smart home environment. …”
Conference Paper -
5
An application of IPA approach on the optimization of a mining port stockyard system
Published 2002“…The results show that PARMSR algorithm applying IPA can be used to estimate the optimal cost function in subsystem 1 with a high level of confidence. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023Conference Paper -
8
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
9
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
10
Using language-based search in mining large software repositories
Published 2011“…The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Using language-based search in mining large software repositories
Published 2011“…The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Article -
12
-
13
Datasets Size: Effect on Clustering Results
Published 2013“…In this paper, we proposed a research technique that implements descriptive algorithms on numeric datasets of varied sizes. We modeled each subset of our data using EM clustering algorithm; two different numbers of partitions (k) were estimated and used for each experiment. …”
Get full text
Get full text
Conference or Workshop Item -
14
A comparative effectiveness of hierarchical and non-hierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions
Published 2022“…In particular, the regional quantile estimates can provide a more accurate estimation compared to at-site quantile estimates using an appropriate statistical distribution.…”
Get full text
Get full text
Get full text
Article -
15
A comparative effectiveness of hierarchical and nonhierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions
Published 2022“…In particular, the regional quantile estimates can provide a more accurate estimation compared to at-site quantile estimates using an appropriate statistical distribution.…”
Get full text
Get full text
Get full text
Article -
16
A comparative effectiveness of hierarchical and nonhierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions
Published 2022“…In particular, the regional quantile estimates can provide a more accurate estimation compared to at-site quantile estimates using an appropriate statistical distribution.…”
Get full text
Get full text
Get full text
Article -
17
A comparative effectiveness of hierarchical and non-hierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions
Published 2022“…In particular, the regional quantile estimates can provide a more accurate estimation compared to at-site quantile estimates using an appropriate statisticaldistribution.…”
Get full text
Get full text
Get full text
Article -
18
Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm
Published 2020“…It focuses more on the data mining use to the Hadith dataset. We put on the Hadith dataset onto one of machine learning tools which is text classification. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise
