Search Results - (( developing continuous learning algorithm ) OR ( java applications mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao by He , Biao

    Published 2024
    “…The developed model is expected to possess the ability of continual learning, which is particularly advantageous in dynamic environments like tunnel blasting. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
    Article
  10. 10

    Development of algorithm for improved maze navigation by Ahmad, Faiz Aydil

    Published 2014
    “…This paper describes the development of algorithm for improved maze navigation and it is a continuation on a previous project. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Learning style analysis based on Felder-Silverman Index Model using Rule Base algorithm by Nurhakim, Muhammad, Ismail, Suhaila, Mohd Yusop, Nurhafizah Moziyana, Ahmad, Siti Rohaidah

    Published 2024
    “…To overcome this concern, the Learning Style Analysis System (SAGP) was developed to identify and provide recommendations based on individual learning styles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…It discusses recent machine learning and deep learning work with various network implementations, applications, algorithms, learning approaches, and datasets to develop an operational intrusion detection system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…In the cycle of Industrial Revolution 4.0 (IR 4.0), many issues in the industries can be solved with implementation of artificial intelligence approaches, including machine learning models. Designing an effective machine learning model for prediction and classification problems is a continuous effort. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    PREDICTING THE PRICE OF COTTON USING RNN AND LSTM by MOHAMAD, AHMAD LUKMAN

    Published 2020
    “…The accuracy of each machine learning algorithm will be recorded and analyze to come up with the best model for the dataset. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    A New Quadratic Binary Harris Hawk Optimization For Feature Selection by Abdullah, Abdul Rahim, Too, Jing Wei, Mohd Saad, Norhashimah

    Published 2019
    “…However, the original HHO is developed to solve the continuous optimization problems, but not to the problems with binary variables. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…Numerous studies implemented machine learning algorithms to develop an effective IDS; however, with the advent of deep learning algorithms and artificial neural networks that can generate features automatically without human intervention, researchers began to rely on deep learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning convolutional neural network algorithms for the early detection and diagnosis of dental caries on periapical radiographs: a systematic review by Musri, Nabila, Christie, Brenda, Ichwan, Solachuddin Jauhari Arief, Cahyanto, Arief

    Published 2021
    “…Identifying caries with a deep convolutional neural network-based detector enables the operator to distinguish changes in the location and morphological features of dental caries lesions. Deep learning algorithms have broader and more profound layers and are continually being developed, remarkably enhancing their precision in detecting and segmenting objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    SYSTEMATIC DESIGN OF SIMPLY STRUCTURED COMPENSATOR by FUNG , CHUN TING

    Published 2005
    “…In this project, the algorithm of the tuning method based on Nyquist Stability Criterion is developed first. …”
    Get full text
    Get full text
    Final Year Project