Search Results - (( adverse selection method algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    New approach for sugarcane disease recognition through visible and near-infrared spectroscopy and a modified wavelength selection method using machine learning models by Pauline Ong, Pauline Ong, Jinbao Jian, Jinbao Jian, Xiuhua Li, Xiuhua Li, Chengwu Zou, Chengwu Zou, Jianghua Yin, Jianghua Yin, Guodong Ma, odong Ma

    Published 2023
    “…These results outperformed those obtained by other wavelength selection approaches, including the selectivity ratio, variable importance in projection, and the baseline method of the flower pollination algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…It evaluates system formation methods, hierarchical structures, and leader selection criteria, comparing various parameters to identify factors influencing node formation and routing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people by Ahmad, Rabiah, Bath, Peter A

    Published 2004
    “…This article describes ongoing research to overcome these limitations through the CoRGA program, which combines Cox regression with a genetic algorithm for the variable selection process. CoRGA was used to try and identify the best combination of risk factors for 4-year all-cause mortality. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem by Lee, Lai Soon, Nazif, Habibeh

    Published 2009
    “…The OCGA is compared with other well known local search method namely dynamic length tabu search, randomised steepest descent method, and other variants of genetic algorithms using extensive data sets collected from the literatures. …”
    Get full text
    Conference or Workshop Item
  12. 12

    Automatic microsleep detection based on KNN classifier utilizing selected and effective EEG channels by Hasan, Md Mahmudul, Hossain, Mirza Mahfuj, Norizam, Sulaiman, Islam, Md Nahidul, Khandaker, Sayma

    Published 2024
    “…Annually, the global economy suffers significant financial losses due to decreased productivity of work, accidents, and crashes in traffic resulting from microsleep. To reduce the adverse impacts of microsleep, it is necessary to have a discreet, dependable, and socially acceptable method of detecting microsleep episodes consistently throughout the day, every single day. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Predicting noise-induced hearing loss (NIHL) in TNB workers using GDAM algorithm by Rehman Gillani, Syed Muhammad Zubair

    Published 2012
    “…The performance of the proposed method known as ‘Gradient Descent Method with Adaptive Momentum (GDAM)’ is compared with ‘Gradient Descent Method with Adaptive Gain (GDM-AG)’ (Nazri, 2007) and ‘Gradient Descent with Simple Momentum (GDM)’ by performing simulations on classification problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…Third, to propose a fault-intrusion-tolerant algorithm (FITSW), which is based on both fault and intrusion-tolerant techniques, to decrease the adverse impact caused by different faults (accidental and malicious) in cloud computing systems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Anti windup implementation on different PID structures by Taip, Farah Saleena, Tham, Ming T.

    Published 2008
    “…In industry, there are various types of PID controllers in addition to the 'textbook' PID but most tuning methods were developed based on this ideal algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Design and development of real-time particulate matter measuring instrument applying laser scattering technique for microenvironment monitoring by Angelo Sean Francis Tiwon

    Published 2020
    “…While PM has been has identified as one of global health threat by the World Health Organization (WHO), and there is an urgent need for routine air monitoring data on components of the PM mass to identify the role of PM chemical components in causing adverse health effects for exposure control, assessment of particle exposure on a more personal level are not achievable by the conventional method due to their high cost and relatively large size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel by Amin, A. K. M. Nurul, Hafiz, A.M. Khalid, Lajis, M. A.

    Published 2011
    “…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…The risk in this situation is that there would be a moral hazard and adverse selection based on information asymmetry among principal construction participants especially contractors; this outcome is called risk attitudes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article