Search Results - (( variable identification system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- variable identification »
- identification system »
- application mining »
- system algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
5
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
Get full text
Get full text
Get full text
Article -
6
Identification of continuous-time hammerstein model using improved archimedes optimization algorithm
Published 2024“…This proposed algorithm also discerned linear and nonlinear subsystem variables within a continuous-time Hammerstein model utilizing input and output data. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
Modelling of cupping suction system based on system identification method
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…Among the most serious limitations facing the success of future consumer gas identification systems are the drift problem and the real-time detection due to the slow response of most of todays gas sensors. …”
Get full text
Get full text
Article -
14
Modeling of cupping suction system based on system identification method
Published 2022“…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
Get full text
Get full text
Undergraduates Project Papers -
15
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…In this paper, major properties of an adaptive fuzzy model as a system identifier when trained by the back-propagation algorithm are discussed. …”
Get full text
Get full text
Get full text
Article -
16
Nonlinear identification for dengue fever / Herlina Abdul Rahim.
Published 2009“…This thesis presents the development of a non-invasive system identification for the monitoring of the progression of dengue infection based on hemoglobin concentration. …”
Get full text
Get full text
Thesis -
17
Deterministic Mutation Algorithm As A Winner Over Forward Selection Procedure
Published 2016“…One of the steps in system identification is model structure selection which involves the selection of variables and terms of a model. …”
Get full text
Get full text
Get full text
Article -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
19
-
20
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article
