Search Results - (( visual integration modified algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- integration modified »
- visual integration »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…We demonstrate our framework; the integration of enhanced Jump Point Search algorithm with modified Bresenham for heuristic computation in virtual grid-based environment. …”
Get full text
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Fast marching method and modified features fusion in enhanced dynamic hand gesture segmentation and detection method under complicated background
Published 2018“…Therefore, for segmenting complete hand gesture region and improving the segmentation accuracy, this study proposes a combination of four modified visual features segmentation procedures, which are skin, motion, skin moving as well as contour features and fast marching method. …”
Get full text
Get full text
Get full text
Article -
12
Parallel computation of maass cusp forms using mathematica
Published 2013“…To facilitate the complete pullback process of this group, a point locater algorithm is developed. In this work, we present three different pullback algorithms for the surfaces we considered and carefully integrate them into our Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
13
Optimal power flow with renewable power generations using hyper-heuristic technique
Published 2024“…The proposed strategy has been visualized and tested on a modified IEEE-57 bus system, and the outcomes of the hyper-heuristic technique have been compared to the effectiveness of the separate low-level meta-heuristics algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
14
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…A digital planimetric view and topographic mapping of the floodplain was developed using the three-dimensional floodplain visualization approach through the integration of a digital terrain model. …”
Get full text
Get full text
Thesis -
15
Optimization of chemotherapy using metaheuristic optimization algorithms / Prakas Gopal Samy
Published 2024“…Advancing multi-objective optimization techniques for cancer treatment strategies, the study strategically incorporates Swarm Intelligence (SI) and Evolutionary Algorithms (EA). Diverging in constraints handling and Pontryagin Maximum Principle (PMP) application, the PMM and HM methodologies are evaluated through the lens of SI and EA, and their outcomes are visualized via the Pareto Optimal Front (PF). …”
Get full text
Get full text
Get full text
Thesis -
16
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…Furthermore, the PBPVD adjustment process would be ideal to exploit in all existing PVD-based techniques to enhance its capacity without degrading the visual quality. Finally, this research proposed hybrid embedding methods by integrating the above RMDR and PBPVD techniques to achieve the optimal steganography objectives. …”
Get full text
Get full text
Get full text
Thesis
