Effectiveness of the Implementations of a Data Mining Algorithm Based Peak Restriction Method

Saved in:
Bibliographic Details
Published inInternational Research Journal of Computer Science
Format Journal Article
LanguageEnglish
Online AccessGet full text
ISSN2393-9842
DOI10.26562/irjcs.2024.v1110.02

Cover

BookMark eNotkEFOwzAURL0oi1K4AQtfICG242AvSylQqRUIdYusX-e7MSROlJii3r5tYDXSG80s3jWZhDYgIXcsS3khC37v-y87pDzjeXpg7IwzPiFTLrRItMr5lHwunUMb_QEDDgNtHY0V0lXT1dhgiBB9G0YM9Aki0I0PPuzpvN63vY9VQx9hwJK-I3zTDxxi7-1lQjcYq7a8IVcO6gFv_3NGts_L7eI1Wb-9rBbzdWI144nGMrcKQDqmkIlcOCVAF1CqEhkqyXa7wjrHOCiBDy6X51bJLHdcFFqWXMyI_Lv9CR0cf6GuTdf7BvqjYZkZTZjRhLmYMKMJk3FxAgPQWf0
ContentType Journal Article
DBID ADTOC
UNPAY
DOI 10.26562/irjcs.2024.v1110.02
DatabaseName Unpaywall for CDI: Periodical Content
Unpaywall
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
ExternalDocumentID 10.26562/irjcs.2024.v1110.02
GroupedDBID ADTOC
UNPAY
ID FETCH-LOGICAL-c912-9ed4c8aa5f18e1343f83a96ad8de1e851bb6cff12a83e7f453a98504f23695d23
IEDL.DBID UNPAY
ISSN 2393-9842
IngestDate Tue Aug 19 16:50:02 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c912-9ed4c8aa5f18e1343f83a96ad8de1e851bb6cff12a83e7f453a98504f23695d23
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.26562/irjcs.2024.v1110.02
ParticipantIDs unpaywall_primary_10_26562_irjcs_2024_v1110_02
PublicationTitle International Research Journal of Computer Science
Score 1.8945882
SourceID unpaywall
SourceType Open Access Repository
Title Effectiveness of the Implementations of a Data Mining Algorithm Based Peak Restriction Method
URI https://doi.org/10.26562/irjcs.2024.v1110.02
UnpaywallVersion publishedVersion
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFA1jexAf_EBFRSUPPtraJmmaPM6PMYQOkQ3mg5TbNtG5rRujU_TXm6adDEHQ14TA5eQmOSG55yB0TplmgeKe46uAOwy4dsBkjkMFpDLJGEnsC37U490BuxsGwwa6WNXCrL3fE0M1yOVo8ZqWstqEuW9mXXpuqRzZ4oFh3k3UGvTu24_WP05SRwpGquq4X4duoo1lPoePd5hM1s6RzjaKVhFU30fG7rJI3PTzhzjjX0PcQVs1ocTtKgN2UUPle-ipEiWudzI809jwPGyVgKd1sVFumwHfQAE4sjYRuD15ni1GxcsUX5nDLcNmvxzjB1Vae9jyBxxZv-l91O_c9q-7Tm2k4KTSJ45UGUsFQKB9oXzKqBYUJIdMZMpXhnIlCU-19gkIqkIzd6ZXBB7ThHIZZIQeoGY-y9UhwioUWugwBEV8BiBBa0LKBiUMdZHBEXK_8Y3nlV5GbO4ZFqjYAhWXQMUWqNgjx_8dcIKaxWKpTg0VKJKzOgO-AGxashk
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFA1jexAf_EBFRSUPPtraJmmaPM6PMYQOkQ3mg5TbNtG5rRujU_TXm6adDEHQ14TA5eQmOSG55yB0TplmgeKe46uAOwy4dsBkjkMFpDLJGEnsC37U490BuxsGwwa6WNXCrL3fE0M1yOVo8ZqWstqEuW9mXXpuqRzZ4oFh3k3UGvTu24_WP05SRwpGquq4X4duoo1lPoePd5hM1s6RzjaKVhFU30fG7rJI3PTzhzjjX0PcQVs1ocTtKgN2UUPle-ipEiWudzI809jwPGyVgKd1sVFumwHfQAE4sjYRuD15ni1GxcsUX5nDLcNmvxzjB1Vae9jyBxxZv-l91O_c9q-7Tm2k4KTSJ45UGUsFQKB9oXzKqBYUJIdMZMpXhnIlCU-19gkIqkIzd6ZXBB7ThHIZZIQeoGY-y9UhwioUWugwBEV8BiBBa0LKBiUMdZHBEXK_8Y3nlV5GbO4ZFqjYAhWXQMUWqNgjx_8dcIKaxWKpTg0VKJKzOgO-AGxashk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Effectiveness+of+the+Implementations+of+a+Data+Mining+Algorithm+Based+Peak+Restriction+Method&rft.jtitle=International+Research+Journal+of+Computer+Science&rft.issn=2393-9842&rft_id=info:doi/10.26562%2Firjcs.2024.v1110.02&rft.externalDocID=10.26562%2Firjcs.2024.v1110.02
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2393-9842&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2393-9842&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2393-9842&client=summon