Search Results - (( data integration generating algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm by Abdolrasol M.G.M., Ker P.J., Hannan M.A., Ayob A., Tiong S.K.

    Published 2024
    “…Weather data, including wind, solar, fuel, and battery status, is integrated into the BGD algorithm for optimizing ON and OFF schedules. …”
    Conference Paper
  8. 8

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Load and service adaptive algorithm (LSAA) for tight coupling based integration architecture by Aziz, A., Saad, N.M.

    Published 2014
    “…In order to fulfill the anywhere at any time data services demand, integration of existing wireless networks has attained the tremendous attention in last decades. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…The purpose of this integration is because it is hoped that the Savitzky Golay filter can act as a high-preservation data generated by SIFT. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…The second phase of the research work is to integrate the RES sites. TSP-GA algorithm is applied to generate the transmission line routing among the RES sites with minimum total distance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
    Article
  15. 15

    Mobile technology generations and cryptographic algorithms: analysis study by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Ant lion optimizer for solving unit commitment with solar photovoltaic integration / Izni Nadhirah Sam’on by Sam’on, Izni Nadhirah

    Published 2020
    “…This research is based on solving unit commitment problem with and without the integration of solar photovoltaic (PV). Data for IEEE 39-bus with 10-unit generators are used with the consideration of system constraints in unit commitment such as power balance, system reserve requirement, generation limit of generators, and minimum up and down time constraints. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A new variant of black hole algorithm based on multi population and levy flight for clustering problem by Haneen Abdul Wahab, Abdul Raheem

    Published 2020
    “…The first modification is the integration of BH algorithm and levy flight, which result in data clustering method, namely “Levy Flight Black Hole (LBH)”. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Data integrity must be ensured before and after the data transmission. …”
    Get full text
    Get full text
    Thesis
  19. 19

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…Proposed framework overcomes the limitation of several existing RTL based approaches, such as the need for explicit separation between controller and data path. The effectiveness of the framework algorithm is shown through lemma proof.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat by Chia , Yu Huat

    Published 2024
    “…This is due to the data generated from the numerical model possess the pattern for the ML algorithm ease of prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis