Search Results - (( variable representation using algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- variable representation »
- representation using »
- application mining »
- java application »
- mining algorithm »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Switching algorithm to avoid attitude representation singularity
Published 2009“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…This paper reviews crossover methods and problem representation, e.g. in the form of binary coded and real coded representation, used by researchers in order to solve engineering operations. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Switching principles to circumvent Euler angle singularity
Published 2010“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition
Published 2007“…In the selection phase, a new variable length genetic algorithm is applied to select the lexical cues. …”
Get full text
Get full text
Thesis -
14
Path optimization using genetic algorithm in laser scanning system
Published 2008Get full text
Get full text
Conference or Workshop Item -
15
A Comparative Study Of Fuzzy C-Means And K-Means Clustering Techniques
Published 2014“…Then, we apply six datasets to measure the quality of clustering result based on the similarity measure used in the algorithm and its representation of clustering result. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2012“…The solution obtained from the LB–MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB–NLP. …”
Get full text
Get full text
Final Year Project -
17
Fault diagnosis by using multi-scale signed directed graph
Published 2022Get full text
Get full text
Conference or Workshop Item -
18
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2009“…The solution obtained from the LB-MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB-NLP. …”
Get full text
Get full text
Final Year Project -
19
Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector
Published 2014“…The ten out of fifteen hypotheses were tested through the use of PLS-SEM algorithm and bootstrap techniques on the hypothesized relationships while the remaining five hypotheses of differences among groups were tested using the Mann-Whitney U Test. …”
Get full text
Get full text
Get full text
Thesis -
20
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
