Search Results - (( variables activation generation algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- activation generation »
- variables activation »
- generation algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…Obtaining successful operation rules for dam and reservoir systems is crucial for improving water management to meet the increase in agricultural, domestic and industrial activities. Several research efforts have been developed to generate optimal operation rules for dam and reservoir systems utilizing different optimization algorithms. …”
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
Get full text
Get full text
Thesis -
11
Bayesian logistic regression model on risk factors of type 2 diabetes mellitus
Published 2016“…Logistic regression model has long been known and it is commonly used in analysing a binary outcome or dependent variable and connects the binary dependent variable to several independent variables. …”
Get full text
Get full text
Thesis -
12
Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH
Published 2021“…The load flow patterns will significantly have affected when uncertain PV generation – load models are considered into the power flow algorithm. …”
Get full text
Get full text
Thesis -
13
Particle swarm optimisation for reactive power compensation on Oman 6 bus electrical grid
Published 2021“…Reduction of system active power loss is the goal of the function in the projected algorithm. …”
Get full text
Get full text
Article -
14
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali
Published 2015“…A current control algorithm is designed as well which controls the active power smoothing index to ensure battery current magnitude is allowable. …”
Get full text
Get full text
Thesis -
16
An evolutionary based features construction methods for data summarization approach
Published 2015“…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
Get full text
Get full text
Research Report -
17
Enhancement of a grid-connected dfig wind turbine system using fractional order PI controllers
Published 2023“…So, variable wind power speed generation has ample significance with the Doubly Fed Induction Generator (DFIG). …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Optimizing decentralized exam timetabling with a discrete whale optimization algorithm
Published 2025“…This problem remains an active area of research and, to the authors' knowledge, has not been adequately addressed by the WOA algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…This problem remains an active area of research and, to the authors’ knowledge, has not been adequately addressed by the WOA algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Development of collision avoidance warning system for heavy vehicles featuring adaptive minimum safe distance / Airul Sharizli Abdullah
Published 2017“…One of the important criteria in CAWS is the criteria for system activation. Proper activation algorithm of the system will reduce the number of false alarms and collision by not presenting the warning too early or too late, but at the right time. …”
Get full text
Get full text
Get full text
Thesis
