Search Results - (( variable information source algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- variable information »
- information source »
- application mining »
- source algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…Data were analyzed using Partial Least Squares-Structural Equation Modeling (PLS-SEM) to examine the relationships between variables. Results: The analysis revealed that all three intrinsic needs—competence, autonomy, and relatedness—along with social media algorithms and source credibility, positively correlated with fitness-related health information use behaviors among youth. …”
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Analysis of robot localisation performance based on extended kalman filter
Published 2015“…EKF is a technique from estimation theory that combines the information of different uncertain sources to obtain the value of variables. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Characterization of water quality conditions in the Klang River Basin, Malaysia using self organizing map and K-means algorithm
Published 2015“…This study aimed to determine the spatiotemporal pattern of the water quality data and identifying the sources of pollution in the Klang River Basin. The self organizing map (SOM) combined with the K-means algorithm arranged the data based on the relationships of 25 variables. …”
Get full text
Get full text
Get full text
Article -
11
Gene Selection For Cancer Classification Based On Xgboost Classifier
Published 2022“…XGBoost Classifier is applied in this research, which it is an efficient open-source implementation of the gradient boosted trees algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…Feature extraction is essential in classification, especially for data sources in the form of images. It involves identifying and isolating relevant information from the images that classification algorithms can use to distinguish between different fruit categories. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
14
Antidepressant Treatment Response Prediction With Early Assessment of Functional Near-Infrared Spectroscopy and Micro-RNA
Published 2025“…The performance of the proposed custom algorithm suggests the prediction of ATR can be improved with multiple features sources, provided that the inter-subject variability is properly addressed, and can be an effective tool for clinical decision support system in MDD ATR prediction. …”
Get full text
Get full text
Article -
15
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2012“…Hence, most of the exposition on the model formulation and solution algorithms are taken directly from the original papers so as to provide the readers with the most accurate information possible.…”
Get full text
Get full text
Final Year Project -
16
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2009“…Hence, most of the exposition on the model formulation and solution algorithms are taken directly from the original papers so as to provide the readers with the most accurate information possible. …”
Get full text
Get full text
Final Year Project -
17
-
18
Evalvid-RASV: Shaped VBR rate adaptation stored video system
Published 2010“…Video traffic is a variable bit rates (VBR data source in nature and it generates highly bursty traffic.Recent implementations mostly buffer the media source in order to regenerate it in the form of constant bit rates (CBR).Consequently, it will add more delays to the system and thus unable to support the original nature of the video data.Inspired by the works of Hamdi et al. and Lie and Klaue, we developed Evalvid-RASV. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
ANALYSIS OF PERFORMANCE PARAMETERS FOR WIRELESS NETWORK USING SWITCHING MULTIPLE ACCESS CONTROL METHOD
Published 2023“…Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. …”
Article
