Search Results - (( changes realization based algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…However, Chinese language features are rich and fuzzy, and the training optimization of lip-reading model requires high GPU computation and storage, so it is difficult to realize large-scale application. Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Black widow optimization-based optimal PI-controlled wind turbine emulator by Premkumar K., Vishnupriya M., Babu T.S., Manikandan B.V., Thamizhselvan T., Ali A.N., Islam M.R., Kouzani A.Z., Parvez Mahmud M.A.

    Published 2023
    “…Finally, the proposed system is realized in real-time by hardware experimentations. …”
    Article
  11. 11

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Simultaneous controllers for stabilizing the frequency changes in deregulated power system using moth flame optimization by Peddakapu, kurukuri, Mohd Rusllim, Mohamed, Srinivasarao, P., Leung, Puiki

    Published 2022
    “…The performance of MFO-based 2DOF PID-FOPDN is evaluated against Cuckoo search (CS), Bat algorithm (BA), and Teaching learning-based optimization (TLBO) approaches in different contract scenarios of deregulated system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking by Ramalu, Tanaselan

    Published 2016
    “…Their main weakness is these algorithms always fail to track MPP and high oscillation occurs whenever the sunlight (irradiance) changes frequently. …”
    Get full text
    Get full text
    Thesis
  16. 16

    UiTM Transportation Unit bus trip scheduling system / Noorzawanah Ab Rahim by Ab Rahim, Noorzawanah

    Published 2009
    “…The proposed heuristic algorithm is based on the simple greedy search, that guide the search efficiently and able to find good solutions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhanced-PID Control Based Antagonistic Control For Pneumatic Artificial Muscle Actuators by Tan, Ming Hui

    Published 2016
    “…Some past control algorithms on the positioning control of PAM mechanisms are discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Network reconfiguration using PSAT for loss reduction in distribution systems by Zehra, E.J.A., Moghavvemi, M., Hashim, M.M.I., Kashem, M.

    Published 2010
    “…Network reconfiguration in distribution system is realized by changing the status of sectionalizing switches, and is usually done for the purpose of loss reduction. …”
    Get full text
    Conference or Workshop Item
  19. 19

    Malaysia network transit route adviser system by Mohd Syafiq, Bachok

    Published 2010
    “…MANTRA using Dijkstra's Algorithm to realize these functions. frIANTRA 98% successfully to advice the tourist goes to the destination using Malaysia Transit.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…The current analysis tools and algorithms employed by the business organization were not designed to analyze the ever dynamic changes in taste and preferences of users when predicting the buying intent ion. …”
    Get full text
    Get full text
    Conference or Workshop Item