Search Results - (( using vector force algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- force algorithm »
- vector »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…These particles are then advected to a new location according to its underlying optical flow vector at the current location. Using the attained flow vectors from this stage, interaction force estimation is done based on SFM theory. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Analysis of Motion Detection using Social Force Model
Published 2013“…Using the vectors from this method, the interaction forces for each particle in video frames is calculated based on Social Force Model algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
A new algorithm to identify nonlinear vibration of car body in white (BIW) structure
Published 2013Get full text
Get full text
Research Book Profile -
10
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Under the operating condition, the presence of unmeasurable forces causes an error in the transfer function calculation due to incomplete information of input forces. …”
Get full text
Get full text
Thesis -
13
Crowd behavior monitoring using self-adaptive social force model
Published 2019“…This is done by advected the particles using the underlying flow vectors of each particle. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Financial time series predicting using machine learning algorithms
Published 2013Get full text
Thesis -
15
Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale
Published 2021“…The application aims to develop a machine learning program using the algorithm of Support Vector Machine or Gaussian Process Regression to successfully predict the contact angle. …”
Get full text
Get full text
Conference or Workshop Item -
16
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…For this purpose Network Simulator 2, NS 2, has been used. Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
Get full text
Get full text
Thesis -
18
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…These output data are analysed to present the optimal prediction output of service restoration using Cuckoo Search Spring – Least Square Support Vector Machine (CSS-LSSVM). …”
Get full text
Get full text
Thesis -
19
A review of classification techniques for electromyography signals
Published 2023“…This article depicts the application of various ML algorithms used in EMG signal analysis till recently, but in the future, it will be used in more medical fields to improve the quality of diagnosis.…”
Get full text
Get full text
Get full text
Article -
20
