Search Results - (( data normalization mining algorithm ) OR ( java _ implementation algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Data normalization techniques in swarm-based forecasting models for energy commodity spot price by Yusof, Yuhanis, Mustaffa, Zuriani, Kamaruddin, Siti Sakira

    Published 2014
    “…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…Association rule mining is one of the data mining techniques which discovers strong association or correlation relationships among data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Improved normalization and standardization techniques for higher purity in K-means clustering by Dalatu, Paul Inuwa, Fitrianto, Anwar, Mustapha, Aida

    Published 2016
    “…Clustering is basically one of the major sources of primary data mining tools, which make researchers understand the natural grouping of attributes in datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining by H’ng, Choo Wooi

    Published 2019
    “…The main goal of this study is to examine the effect of various geometrical attributes to predict the leaf mechanical properties based on four different indicators using data mining approach. An experimental study involving 20 different species of the terrestrial plants were conducted. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining by Termedi @ Termiji, Mohammad Izzuan

    Published 2023
    “…Data mining has been widely applied in educational area recently and it is commonly called Educational Data Mining (EDM). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book