Search Results - (( developing formative risk algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    PREDICTION OF THE THERMODYNAMIC HYDRATE FORMATION CONDITIONS FOR METHANE GAS by Abbasi, A., Soomro, A.A., Hashim, F.M.

    Published 2022
    “…The thermodynamic conditions for hydrate formation were used to assess the plugging risk. Hydrate formation thermodynamic properties and chemical reaction were statistical analyses on developed model results. …”
    Get full text
    Get full text
    Article
  9. 9

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  10. 10
  11. 11

    System setup on jetson nano for smart crowd covid monitoring system by Muhammad Othman, Maliki

    Published 2022
    “…Labels can be downloaded in one of the many formats that are supported.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…Keywords: Robo-Advisory Services; Perceived Risk; Trust; Ease of Use; Technology Acceptance Model Subject Area: HG4501-6051 Investment, capital formation, speculation…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    An artificial intelligence approach to monitor student performance and devise preventive measures by Khan I., Ahmad A.R., Jabeur N., Mahdi M.N.

    Published 2023
    “…This research evaluates the effectiveness of machine learning algorithms to monitor students� academic progress and informs the instructor about the students at the risk of ending up with unsatisfactory result in a course. …”
    Article
  17. 17

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…Additionally, the present study has developed a prediction model of wind speed for these three sites in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Design, development and evaluation of a game-based learning application for room housekeeping by Tan, Fui Ming, Siti Normaziah, Ihsan, Nor Maizana, Mat Nawi, Mohd Razali, Nor Amira

    Published 2024
    “…The simulation not only allowed students to practice essential housekeeping skills but also promoted critical thinking and problem-solving within a risk-free environment. The paper concludes with a discussion on potential enhancements such as incorporating adaptive learning algorithms and multiplayer features to support collaborative learning. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Conventional and intelligent models for detection and prediction of fluid loss events during drilling operations: A comprehensive review by Krishna, S., Ridha, S., Vasant, P., Ilyas, S.U., Sophian, A.

    Published 2020
    “…Fluid loss to subsurface formations is a challenging aspect during drilling operations in petroleum industry. …”
    Get full text
    Get full text
    Article