Search Results - (( development identification mining algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  2. 2

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  9. 9

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Most methods in the early work that detects outliers independently have been developed in field of Statistics. Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…In this paper, we analyze the literature and identify the text mining factors that influence the identification of relevant studies. …”
    Article
  13. 13

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  14. 14

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail by Azilawati Azizan, Azilawati Azizan, NurAine Saidin, NurAine Saidin, Nurkhairizan Khairudin, Nurkhairizan Khairudin, Rohana Ismail, Rohana Ismail

    Published 2020
    “…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…To achieve this objective, the research was divided into three phases, which consist of talent data identification and data preparation phase, algorithm development for prototype phase and testing and evaluation phase to identify the most suitable prediction model for talent prediction. …”
    Get full text
    Get full text
    Research Reports
  19. 19

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Context aware app recommendation using email semantic analysis by Tang, Zi Cong

    Published 2019
    “…The recommendation system is planned to develop by using data mining and machine learning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis