Search Results - (( developing utilisation integration algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    INTELLIGENT MODELLING OF GRADIENT FLEXIBLE PLATE STRUCTURE UTILISING HYBRID EVOLUTIONARY ALGORITHM by Muhammad Hasbollah, Hassan

    Published 2023
    “…First, evolutionary algorithms, namely particle swarm optimisation (PSO) and grey wolf optimisation (GWO) were used in developing GFPS dynamic model and their performances were compared. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…In each case, the Traveling Salesman Problem-Genetic Algorithm (TSP-GA) algorithm is applied to determine a minimum total distance of RES sites integration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Module integrated MPPT converter for photovoltaic / Muhammad Nur Al Hafiz Mohamad Husaini by Mohamad Husaini, Muhammad Nur Al Hafiz

    Published 2020
    “…To apply perturb and observe algorithm of MPPT using MATLAB/Simulink. Develop the module integrated MPPT. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    Carbon dioxide management for product supply chain and total site utilisation and storage by Mohd Nawi, Wan Norlinda Roshana

    Published 2018
    “…Finally, CO2 purification and pressure drop are considered during CO2 transportation in the total site CO2 integration system’s design. An algebraic approach called CO2 utilisation and storage-problem table algorithm is proposed to obtain total site target for integration of CO2 utilisation and storage. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Particle Swarm Optimisation (PSO) was selected as the base algorithm that needs improvement and integration with other techniques. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…The Linear-PSO algorithm was the first version of improvement. However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Sustainable Management Of River Water Quality Using Artificial Intelligence Optimisation Algorithms by Chia, See Leng

    Published 2021
    “…Least Square Support Vector Machine (LSSVM) base models with linear kernel, polynomial kernel and Radial Basis Function (RBF) kernel and its hybrid models with integration of Hybrid of Particle Swarm Optimisation and Genetic Algorithm (HPSOGA), Whale Optimisation Algorithm based on Self-adapting Parameter Adjustment and Mix Mutation Strategy (SMWOA) and Ameliorative Moth Flame Optimisation (AMFO) were developed and used to predict the WQI at stations 1K06, 1K07 and 1K08 of the Klang River in Selangor, Malaysia. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…Secondly, a new voltage stability prediction technique utilising state of the art machine learning, Support Vector Machine (SVM) was developed. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved Bat Algorithm for faster convergence in solving optimisation problem by Ramli, Mohamad Raziff

    Published 2021
    “…One of the optimisation approaches is metaheuristic. Metaheuristic algorithms are inspired by nature and utilise intelligent mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity by Yau, Jia Xin

    Published 2023
    “…As an additional layer of security, the Google Safe Browsing List is utilised to verify the output produced by the Random Forest classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis