Search Results - (( variable activation connection algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- activation connection »
- connection algorithm »
- application mining »
- java application »
- mining algorithm »
- variable »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Enhancement of a grid-connected dfig wind turbine system using fractional order PI controllers
Published 2023“…Furthermore, in the validation of the proposed algorithm, the performance parameters like DC coupling capacitor voltage, rotor Speed, active power, and reactive power with PI, FOPI, PSO-FOPI, and ALO-FOPI regulators are compared and analysed using the bode plot are presented. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Bayesian logistic regression model on risk factors of type 2 diabetes mellitus
Published 2016“…Logistic regression model has long been known and it is commonly used in analysing a binary outcome or dependent variable and connects the binary dependent variable to several independent variables. …”
Get full text
Get full text
Thesis -
10
A Fuzzy-Based PI Controller for Power Management of a Grid-Connected PV-SOFC Hybrid System
Published 2017“…This paper presents a power management system for a grid-connected PV and solid oxide fuel cell (SOFC), considering variation in the load and solar radiation. …”
Get full text
Get full text
Get full text
Article -
11
Microgrid multi-distributed energy resources for power management network stability / Bilal Mouneir Saeed Eid
Published 2016“…The impact on the active and reactive powers, by ambient disturbances such as solar radiation with severe disturbances, and variable PV cell temperature, are investigated. …”
Get full text
Get full text
Thesis -
12
A fuzzy-based PI controller for power management of a grid-connected PV-SOFC hybrid system
Published 2023Article -
13
Artificial Neural Network-Forecasted Compression Strength of Alkaline-Activated Slag Concretes
Published 2022“…To identify the parametric influence, the individual relative importance of each input variable was determined through a sensitivity analysis using the connection weight approach, whose results indicated that the silica modulus of the activator and sodium silicate greatly affected the AASC compressive strength. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A peer-to-peer blockchain based interconnected power system
Published 2021“…This paper uses a Shunt Active Power Filter (SHAPF). It describes the simulation analysis and reduction of harmonics detection in a peer-to-peer interconnected 3-phase power system with the help of an FFT algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
Get full text
Get full text
Thesis -
16
Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali
Published 2015“…Microgrid is able to supply its local load based on operator decision and decline the power oscillations caused by solar photovoltaic (PV) plant together with variable loads. An algorithm is also proposed which helps to precisely design the battery energy storage plant. …”
Get full text
Get full text
Thesis -
17
EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network
Published 2021“…In addition, EZ-SEP is weighted up using various estimation schemes such as base station repositioning, altering the field density, and variable nodes energy for comparison with the previous parent algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH
Published 2021“…The objective function is to minimize the active power loss (APL) index. The proposed algorithm is applied to the standard radial test system to examine the usefulness and effectiveness of the proposed method. …”
Get full text
Get full text
Thesis -
19
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…Vehicular Ad hoc Network (VANET) clustering is an active research area where a group of connected vehicles forms an ad hoc network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier
Published 2017“…The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
Get full text
Get full text
Get full text
Article
