Search Results - (( variable detection machine algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- variable detection »
- application mining »
- machine algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Pure intelligent monitoring system for steam economizer trips
Published 2023“…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
Conference Paper -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
9
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques
Published 2025“…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
Get full text
Get full text
Monograph -
11
Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study
Published 2022“…For this reason, this study compares eleven machine learning algorithms to determine which one produces the best accuracy for predicting thyroid risk accurately. …”
Get full text
Get full text
Get full text
Article -
12
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
13
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
Get full text
Get full text
Thesis -
14
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine
Published 2022“…The present study investigates the accuracy of different machine learning classification algorithms with three different data smoothing techniques for gas turbine fault detection and isolation task. …”
Get full text
Get full text
Article -
17
Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine
Published 2022“…The present study investigates the accuracy of different machine learning classification algorithms with three different data smoothing techniques for gas turbine fault detection and isolation task. …”
Get full text
Get full text
Article -
18
Development of sorting system for oil palm in vitro shoots using machine vision approach
Published 2014“…Ultimately, the sorting algorithm performance came to be evaluated by support vector machine algorithm. …”
Get full text
Get full text
Thesis -
19
Predictive Modelling of Stroke Occurrence among Patients using Machine Learning
Published 2023“…Advanced machine learning algorithms, including logistic regression, decision trees, random forests, and support vector machines, were utilized to analyses the dataset and develop a predictive model. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Detection of phishing websites using machine learning approaches
Published 2021“…Phishing websites can be detected using machine learning by classifying the websites into legitimate or illegitimate websites. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
