Search Results - (( developing functional forms algorithm ) OR ( java applications mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization by Pradyumna Kumar Mohapatra, Saroja Kumar Rout, Sukant Kishoro Bisoy, Sandeep Kautish, Muzaffar Hamzah, Muhammed Basheer Jasser, Ali Wagdy Mohamed

    Published 2022
    “…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. Here, in this work, to develop the symmetry-based efficient channel equalization in wireless communication, this paper proposes a modified form of bat algorithm trained with ANN for channel equalization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo by Ibrahim Teo, Noor Hasimah

    Published 2005
    “…One-way hashing function consists of several algorithms. However MD5 is the most common hashing function currently in use. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Support directional shifting vector: A direction based machine learning classifier by Kowsher, Md., Hossen, Imran, Tahabilder, Anik, Prottasha, Nusrat Jahan, Habib, Kaiser, Zafril Rizal, M Azmi

    Published 2021
    “…The positional error of the linear function has been modelled as a loss function which is iteratively optimized using the gradient descent algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The superior performances of the developed bats echolocation-inspired algorithms are verified through rigorous tests with optimisation benchmark test functions and problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Application of adaptive bats sonar algorithm to minimise car side impact design by Tan, Hon Seong

    Published 2017
    “…The best objective function was compared with the existing results of other swarm intelligence algorithms. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
    Get full text
    Get full text
    Thesis
  18. 18

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…In this work, a new microcontroller board was designed and developed with Genetic Algorithm (GA) embedded on board. …”
    Conference paper
  19. 19
  20. 20

    A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud by Mohd Daud, Mohd Rosli

    Published 2007
    “…Prototypes are developed for both MD5 and SHA1 in one way hashing function using evolutionary approach. …”
    Get full text
    Get full text
    Research Reports