Search Results - (( variable detection system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- variable detection »
- application mining »
- system algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. Furthermore, a linear model has been built to facilitate the accomplishment of the fault detection of the industrial servo system by using the proposed observer. …”
Get full text
Get full text
Get full text
Article -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
10
-
11
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
12
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
13
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
14
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
17
Road Sign Detection and Recognition System for Real-Time Embedded Applications
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…However, multiple access interference (MAI) is a major constraint limiting the capacity of the system. Multiuser detection and smart antenna technologies are capable of increasing the system capacity through mitigation of such impairment. …”
Get full text
Get full text
Thesis -
19
Pure intelligent monitoring system for steam economizer trips
Published 2023“…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
Conference Paper -
20
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis
