Search Results - (( variable training does algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- variable training »
- java application »
- mining algorithm »
- does algorithm »
- training does »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…Multi-objective Genetic Algorithms (MOGA) are an extension of Genetic Algorithms (GA) that does not require multiple objectives to be aggregated to one value. …”
Get full text
Get full text
Proceeding Paper -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Development Of Water Quality Index Prediction Model For Penang Rivers Using Artificial Neural Network
Published 2021“…As for the implementation of MPCA in feature extraction for BOD and COD, there were only 4 inputs required to explain at least 99.999% variability for both analyses. Altogether, for BOD, the BR algorithm with 60% training and 12 hidden nodes gives R=0.7825 whereas for COD, the BR algorithm with 70% training and 10 hidden nodes gives R=0.6716. …”
Get full text
Get full text
Monograph -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
10
A novel computer-aided multivariate water quality index
Published 2015“…Results indicate that the algorithm is robust and reliable. Based on six parameters, the overall ratings derived are inversely correlated to DOE-WQI. …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
13
A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing
Published 2024“…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
Get full text
Get full text
Get full text
Thesis -
14
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Also a new algorithm for finding the initial point is proposed. …”
Get full text
Get full text
Thesis -
15
Model Prediction Of Pm2.5 And Pm10 Using Machine Learning Approach
Published 2021“…It was found that taking into account the removal of the irrelevant variables does not increase precision significantly nor does it reduce the performance tremendously. …”
Get full text
Get full text
Monograph -
16
Predicting Diseases Using Multi-BackPropagation
Published 2002“…Multi-network approach does not require any changes in neural network learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Classification of water quality using artificial neural network
Published 2020“…Concentrations of these six parameters were used in the mathematical equation of the DOE-WQI technique and as input variables in the ANN database system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Machine learning models for predicting the compressive strength of concrete with shredded pet bottles and m sand as fine aggregate
Published 2025“…Machine learning is a critical subset of AI that deliberates the development of self-trained algorithms that use previous databases and analysis for result predictions. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A robust prioritization framework of data quality dimensions to improve ML-driven healthcare systems using AHP and sensitivity analysis
Published 2025“…In contrast to performance evaluation studies involving machine learning algorithms or classifiers, this research does not encompass the training or comparison of predictive models. …”
Get full text
Get full text
Get full text
Article -
20
