Search Results - (( based validation using algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz by Aziz, Azwani

    Published 2010
    “…Partition Entropy is the most frequently used cluster validity index. In most of fuzzy cluster validity indexes, the separation measures are calculation based on the distances among cluster centers. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks by Saqer, Ahmad Sabri Mousa

    Published 2012
    “…Validation of the proposed algorithm (MR-CSA) was based on comparison of its performance with the performance of the centralized pairing algorithm while the proposed MR-DSA algorithm was validated through comparing its performance against that of the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of throughput and the average packet throughput. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…Text preprocessing ensures consistent data representation and facilitates validation. The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
    Get full text
    Get full text
    Thesis
  20. 20

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…The fault syndrome based on read operations of the proposed algorithm is generated to determine its diagnostic capability. …”
    Get full text
    Get full text
    Thesis