Search Results - (( variable create proposed algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- proposed algorithm »
- application mining »
- java application »
- mining algorithm »
- variable »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The flexibility and adaptability represent the main objectives of the proposed observer. This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. …”
Get full text
Get full text
Get full text
Article -
8
A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam
Published 2021“…The proposed algorithm enhances the steady-state and dynamic responses by introducing an improved adaptive step-size for updating variables. …”
Get full text
Get full text
Get full text
Thesis -
9
Enhancing Model Selection Based On Penalized Regression Methods And Empirical Mode Decomposition
Published 2021“…This study aims to apply the proposed SCAD-EMD, adLASSO-EMD, MCP-EMD and ELNET-EMD methods to determine the effect of the decomposition components of the original univariate/multivariate time series predictor variable(s) on the response variable. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
Get full text
Get full text
Get full text
Thesis -
12
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.…”
Get full text
Get full text
Article -
13
An Efficient Solution to Travelling Salesman Problem using Genetic Algorithm with Modified Crossover Operator
Published 2019“…The efficiency of the proposed algorithm is compared to the classical genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
14
A Constraint Programming-based Genetic Algorithm (CPGA) for Capacity Output Optimization
Published 2014“…A genetic algorithm model was created in the second stage to optimize capacity output. …”
Get full text
Get full text
Get full text
Article -
15
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
Get full text
Get full text
Book Section -
16
Projecting image on non-planar surface with zero-th order geometric continuity using simple dual-linear function and manipulation of strict integer implementation in programming la...
Published 2015“…Usage of a projection system to display large screen images is still relevant in the midst of LED-based display increasing popularity.This is due to that the system itself is a mature technology, reliable and cheaper than the LED counterpart.While various methods had addressed the projection problems on curve surface, projecting image on jagged like surface (zero order geometric continuity) has yet to be studied in depth.This paper proposes a method for projecting image on non-planar surface with zero-order geometric continuity property using parametric modeling.The method manipulate linear function by combining two functions into one by taking advantage of computer programs strict implementation of integer variables.The method was applied to grid-based texturing algorithm in order to create the desired zero-continuity effect on the surface.The method was compared with texturing that implement existing curve algorithm to project image on the screen.Visual evaluation results showed that the proposed method fared better compared to existing curve-based projection algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim
Published 2023“…For the best practice machine learning pipelines, various machine learning models are used to discover the best model for CCRA study. This study has proposed an automated model selection based on the exhaustive search algorithm—that caused the timeout and memory leak issues. …”
Get full text
Get full text
Thesis -
18
Using fuzzy association rule mining in cancer classification
Published 2011“…At first, different subset of genes which have been selected by different methods, were used to generate primary fuzzy classifiers separately and then proposed algorithm was implemented to mix the genes which have been associated in the primary classifiers and generate a new classifier. …”
Get full text
Get full text
Article -
19
Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing
Published 2019“…Among the most promising TCP techniques is similarity-based TCP technique which consists of similarity distance measure and prioritization algorithm. The goal of this paper is to propose an enhanced string distance and prioritization algorithm which could reorder the test cases resulting to higher rate of fault detection. …”
Get full text
Get full text
Get full text
Article -
20
Controlling traffic for clean air and healthy cities with multi-fuzzy inference systems for a sustainable future
Published 2025“…Therefore, the algorithm in this study has the potential to be further developed to help reduce traffic congestion in big cities; thus, it can be a sustainable solution to create cleaner, healthier, and more sustainable cities in the future.…”
Get full text
Get full text
Get full text
Article
