Search Results - (( based classification path algorithm ) OR ( java applications mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Jamaludin, Sallim, Kohbalan, Moorthy

    Published 2021
    “…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks by Shah, P.A., Hasbullah, H.B., Rafique, S., Rehman, S.U., Jung, L.T.

    Published 2014
    “…This problem can best be modelled through fuzzy logic based classification that is based on continuous values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…The main motivation of this study is to find out techniques that may improve EEG signal classification. SAX algorithm may bring improvement to classic time series classification, so we investigate it`s impact on EEG signal classification. …”
    Get full text
    Thesis
  11. 11
  12. 12

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Comparison between Levenberg-Marquardt and scaled conjugate gradient training algorithms for ionosphere condition using Multilayer Perceptrons / Mohd Sharif Ibrahim by Ibrahim, Mohd Sharif

    Published 2010
    “…Based on the result, there are concluded that both algorithms were comparable in terms of accuracy and speed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Classification and quantification of palm oil adulteration via portable NIR spectroscopy by Basri, Katrul Nadia, Hussain, Mutia Nurulhusna, Bakar, Jamilah, Sharif, Zaiton, Abdul Khir, Mohd Fared, Zoolfakar, Ahmad Sabirin

    Published 2017
    “…The result of R2 and RMSEC after variable selection for transflectance and transmission were improved significantly. Based on the result of classification and quantification analysis, the transmission mode has yield better prediction model compared to the transflectance mode to distinguish the pure and adulterated palm oil.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Ant colony optimization for vehicle traffic systems: applications and challenges by Mohammad Reza Jabbarpour, Hossein Malakooti, Rafidah Md Noor, Nor Badrul Anuar, Norazlina Khamis

    Published 2014
    “…Thus, ant-based algorithms are now being adopted by vehicle traffic systems VTSs to guide vehicles to less congested paths. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
    text::Thesis