Search Results - (( developing based cp algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8

    Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning by Ahmed Mohamed Ghetas, Mohamed Rezk

    Published 2017
    “…In addition, a new ri is developed using case-based reasoning and is then plugged into the rop framework. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fault location in unbalanced distribution system including distributed generation units using multi-layer feed forward neural network by Farzan, Payam

    Published 2014
    “…Fault location finding process in distribution network is totally different based on the application of developed algorithms for the transmission lines due to characteristics of distribution system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Scalable workflow scheduling algorithm for minimizing makespan and failure probability by Abdul Aziz, Maslina, Ninggal, Izuan Hafez

    Published 2019
    “…Based on the simulation results, the proposed algorithm has improved the overall workflow scheduling effectiveness in comparison with existing algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Some Metaheuristics for Tourist Trip Design Problem by Son, N.T., Nguyet Ha, T.T., Jaafar, J.B., Anh, B.N., Giang, T.T.

    Published 2023
    “…We also compared the proposed method with the Posteriority approach to MOP. The results show that CP-based algorithms are superior to NSGA-II in finding a Pareto frontier. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems by Abdulghafor, Rawad Abdulkhaleq Abdulmolla, Turaev, Sherzod, Zeki, Akram M., Adamu, Abubakar Ibrahim

    Published 2018
    “…We develop two algorithms: 1) the nonlinear algorithm of extreme doubly stochastic quadratic operator (NLAEDSQO) to generate all the convergent EDSQOs and 2) the nonlinear convergence algorithm (NLCA) of EDSQOs to investigate the optimal consensus for MAS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20