Search Results - (( variable extractions term algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- extractions term »
- java application »
- mining algorithm »
- term algorithm »
- variable »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Classification for large number of variables with two imbalanced groups
Published 2020“…The difference between the two algorithms is in terms of the order of resampling and variable extraction prior to the construction of linear discriminant analysis (LDA). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…Firstly, a multi-objective feature selection approach is developed in this study to extract the most influential subsets of input variables from each historical data type (EEC and SEI) with maximum relevancy and minimum redundancy for long-term EEC modeling. …”
Get full text
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Parameter extraction of single, double, and three diodes photovoltaic model based on guaranteed convergence arithmetic optimization algorithm and modified third order Newton Raphso...
Published 2022“…The proposed guaranteed convergence arithmetic optimization algorithm based on efficient modified third order Newton Raphson (GCAOAEmNR) method highlights important contributions to the literature in terms of methodology (explorer-exploiter phases) and objective function design. …”
Get full text
Get full text
Article -
11
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
Get full text
Get full text
Thesis -
12
-
13
Fast adaptive motion estimation search algorithm for H.264 encoder
Published 2012“…Furthermore this study presents an analysis of the performance of the proposed algorithm in terms of motion estimation time, total encoding time, video quality (PSNR), and bit rate. …”
Get full text
Get full text
Thesis -
14
The impact of the combat method on radiomics feature compensation and analysis of scanners from different manufacturers
Published 2024“…Conclusions: The Combat algorithm has reduced variability in radiomic features from different scanners. …”
Get full text
Get full text
Get full text
Article -
15
Linear regression convolutional neural network for fully automated coronary lumen segmentation in intravascular optical coherence tomography / Yong Yan Yin
Published 2018“…In addition, an inter-observer variability test was performed and has shown that the proposed algorithm has comparable variability against manual luminal area estimations by expert human observers. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The methodology starts with literature comprehension studies on the computation pitfalls and existed augmentation studies of Simplex algorithm. Then, followed by concept development which consists of concept extraction, computation stages classification and algorithms integration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…In order to achieve the aim, several objective must be carried out which are including the classification process in order to identify urban area in Penang Island in both image. Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. …”
Get full text
Get full text
Thesis -
19
Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm
Published 2025“…However, existing RUL prediction approaches have difficulties with variability and nonlinearity that occur during battery degradation, data extraction, feature extraction, hyperparameters optimization, and prediction model uncertainty. …”
Article -
20
RARE: mining colossal closed itemset in high dimensional data
Published 2018“…Among the vast data mining tasks, association rules have been extensively employed so as to describe the correlations between the variables found in a dataset. The task of mining association rules highly relies on the efficiency of the algorithms to extract all frequent itemsets that exist in the database. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
